@article{3225e31ad7804d6a8c3c27900462b69d, title = "Using Deep Learning for price prediction by exploiting stationary limit order book features", abstract = "The recent surge in Deep Learning (DL) research of the past decade has successfully provided solution to many difficult problems. The field of Quantitative analysis has been slowly adapting the new methods to its problems, but due to problems such as the non-stationary nature of financial data, significant challenges must be overcome before DL is fully utilized. In this work a new method to construct stationary features is proposed such that allows DL models to be applied effectively. These features are thoroughly tested on the task of predicting mid price movements of the Limit Order Book. Several DL models are evaluated such as recurrent Long Short Term Memory (LSTM) networks and Convolutional Neural Networks (CNN). Finally a novel model that combines the ability of the CNN to extract useful features and the ability of LSTMs’ to analyse time series, is proposed and evaluated. The combined model is able to outperform the individual LSTM and CNN models in the prediction horizons that are tested.", keywords = "Deep Learning, Limit order book, Price forecasting, Stationary features", author = "Avraam Tsantekidis and Nikolaos Passalis and Anastasios Tefas and Juho Kanniainen and Moncef Gabbouj and Alexandros Iosifidis", note = "EXT={"}Tefas, Anastasios{"} EXT={"}Iosifidis, Alexandros{"}", year = "2020", month = "8", day = "1", doi = "10.1016/j.asoc.2020.106401", language = "English", volume = "93", journal = "Applied Soft Computing", issn = "1568-4946", publisher = "Elsevier", }
@article{62f43564983e428eb200530788c3de4b, title = "On the zeros of the partial Hosoya polynomial of graphs", abstract = "The partial Hosoya polynomial (or briefly the partial H-polynomial) can be used to construct the well-known Hosoya polynomial. The ith coefficient of this polynomial, defined for an arbitrary vertex u of a graph G, is the number of vertices at distance i from u. The aim of this paper is to determine the partial H-polynomial of several well-known graphs and, then, to investigate the location of their zeros. To pursue, we characterize the structure of graphs with the minimum and the maximum modulus of the zeros of partial H-polynomial. Finally, we define another graph polynomial of the partial H-polynomial, see [9]. Also, we determine the unique positive root of this polynomial for particular graphs.", keywords = "Cut-vertex, Distance, Hosoya polynomial, Polynomial roots", author = "Modjtaba Ghorbani and Matthias Dehmer and Shujuan Cao and Lihua Feng and Jin Tao and Frank Emmert-Streib", year = "2020", month = "7", day = "1", doi = "10.1016/j.ins.2020.03.011", language = "English", volume = "524", pages = "199--215", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@inproceedings{84a0c845da8d46a2822e209bffd03bc6, title = "SeCon-NG: Implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG", abstract = "There is no doubt that the Internet of Things (IoT) has the power to change our world and drive us to a complete social evolution. In business and industry, there are thousands of IoT use cases and real-life IoT deployments across a variety of sectors (e.g. industry 4.0 and smart factories, smart cities, etc.). However, due to the vastly resource constrained nature of the devices used in IoT, implementing secure and privacy-preserving services, using for example standard asymmetric cryptographic algorithms, has been a real challenge. The majority of IoT devices on the market currently employ the use of various forms of symmetric cryptography such as key pre-distribution. The overall efficiency of such implementations correlate directly to the size of the IoT environment and the deployment method. In this paper, we implement a lightweight cryptographic library that can be used to secure communication protocols between multiple communicating nodes without the need for external trusted entities or a server. Our implementation is based on modifying the Elliptic-Curve Diffie-Hillman (ECDH) and Elliptic Curve Digital Signature Algorithm (ECDSA) components of the Tinycrypt cryptographic library. This work focuses on extending the functionalities of the User Datagram Protocol (UDP) broadcast application on the Contiki-NG Operating System (OS) platform.", keywords = "Contiki-NG, Elliptic curve cryptography, Key distribution, Lightweight cryptography, Privacy, Wireless sensor networks", author = "Eugene Frimpong and Antonios Michalas", year = "2020", month = "3", day = "30", doi = "10.1145/3341105.3374076", language = "English", series = "Proceedings of the ACM Symposium on Applied Computing", publisher = "ACM", pages = "767--769", booktitle = "35th Annual ACM Symposium on Applied Computing, SAC 2020", }
@article{15623d4355614a4cb1e44b0254f5f09f, title = "Gaussian mixture models for signal mapping and positioning", abstract = "Maps of RSS from a wireless transmitter can be used for positioning or for planning wireless infrastructure. The RSS values measured at a single point are not always the same, but follow some distribution, which vary from point to point. In existing approaches in the literature this variation is neglected or its mapping requires making many measurements at every point, which makes the measurement collection very laborious. We propose to use GMs for modeling joint distributions of the position and the RSS value. The proposed model is more versatile than methods found in the literature as it models the joint distribution of RSS measurements and the location space. This allows us to model the distributions of RSS values in every point of space without making many measurement in every point. In addition, GMs allow us to compute conditional probabilities and posteriors of position in closed form. The proposed models can model any RSS attenuation pattern, which is useful for positioning in multifloor buildings. Our tests with WLAN signals show that positioning with the proposed algorithm provides accurate position estimates. We conclude that the proposed algorithm can provide useful information about distributions of RSS values for different applications.", keywords = "Gaussian mixtures, Indoor positioning, RSS, Signal mapping, Statistical modeling", author = "M. Raitoharju and F. Garc{\'i}a-Fern{\'a}ndez and R. Hostettler and R. Pich{\'e} and S. S{\"a}rkk{\"a}", year = "2020", month = "3", day = "1", doi = "10.1016/j.sigpro.2019.107330", language = "English", volume = "168", journal = "Signal Processing", issn = "0165-1684", publisher = "Elsevier", }
@article{e0b3dd10d10c40c6a4854406a57d09a9, title = "Validating effectiveness of safety requirements' compliance evaluation in process assessments", abstract = "Safety is the primary concern when developing systems containing software in the nuclear power domain. Process assessments are used to ensure quality of the development processes for safety-critical systems. Regulators of the nuclear power industry have increased requirements concerning the systems development processes. Now, process assessments are integrated in the qualification of the systems and are expected to provide information not only based on the assessment model but also about the domain-specific requirements. Therefore, a specific activity, compliance evaluation, was inserted into the assessment process to provide detailed information that supports analysis of the compliance to the domain standards. Compliance evaluation utilizes assessment findings to create evidence of the relevant domain-specific requirements. The main purpose of this study is to validate effectiveness of compliance evaluation by analyzing assessment findings and their relation to the requirements of a safety-critical domain. The analysis is based on representing the data in compliance evaluation reports as binary relations. The results of this analysis indicate that process assessment findings are also relevant when evaluating compliance to other sets of requirements. The results can significantly support the trustworthiness of the process assessment method and ensure effective use of process assessments.", keywords = "Nuclear SPICE, process assessment, safety, systems engineering", author = "Timo Varkoi and Timo M{\"a}kinen and Frank Cameron and Risto Nevalainen", year = "2020", month = "3", day = "1", doi = "10.1002/smr.2177", language = "English", volume = "32", journal = "Journal of Software: Evolution and Process", issn = "2047-7473", number = "3", }
@article{da7fe45449064d1da3df37cc0f264b09, title = "A custom processor for protocol-independent packet parsing", abstract = "Networking devices such as switches and routers have traditionally had fixed functionality. They have the logic for the union of network protocols matching the application and market segment for which they have been designed. Possibility of adding new functionality is limited. One of the aims of Software Defined Networking is to make packet processing devices programmable. This provides for innovation and rapid deployment of novel networking protocols. The first step in processing of packets is packet parsing. In this paper, we present a custom processor for packet parsing. The parser is protocol-independent and can be programmed to parse any sequence of headers. It does so without the use of a Ternary Content Addressable Memory. As a result, the area and power consumption are noticeably smaller than in the state of the art. Moreover, its output is the same as that of the parser used in the Reconfigurable Match Tables (RMT). With an area no more than that of parsers in the RMT architecture, it sustains aggregate throughput of 3.4 Tbps in the worst case which is an improvement by a factor of 5.", keywords = "Advanced program control, Packet parsing, Programmable data plane, Software defined networking", author = "Hesam Zolfaghari and Davide Rossi and Jari Nurmi", year = "2020", month = "2", day = "1", doi = "10.1016/j.micpro.2019.102910", language = "English", volume = "72", journal = "Microprocessors and Microsystems", issn = "0141-9331", publisher = "Elsevier", }
@inproceedings{d93cf1333369428faca03b8dddd5bd07, title = "A preliminary network analysis on steam game tags: Another way of understanding game genres", abstract = "Video game genre classification has long been a focusing perspective in game studies domain. Despite the commonly acknowledged usefulness of genre classification, scholars in the game studies domain are yet to reach consensus on the game genre classification. On the other hand, Steam, a popular video game distribution platform, adopts the user-generated tag feature enabling players to describe and annotate video games based on their own understanding of genres. Despite the concern of the quality, the user-generated tags (game tags) provide an opportunity towards an alternative way of understanding video game genres based on the players' collective intelligence. Hence, in this study, we construct a network of game tags based on the co-occurrence of tags in games on Steam platform and analyze the structure of the network via centrality analysis and community detection. Such analysis shall provide an intuitive presentation on the distribution and connections of the game tags, which furthermore suggests a potential way of understanding the important tags that are commonly adopted and the main genres of video games.", keywords = "centrality, community detection, game tag, genre, modularity, network, steam, video game", author = "Xiaozhou Li and Boyang Zhang", note = "INT=coms,{"}Li, Xiaozhou{"}", year = "2020", month = "1", day = "29", doi = "10.1145/3377290.3377300", language = "English", pages = "65--73", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{4a5d0a351a6d4702885b53a4f8293246, title = "Color game: A collaborative social robotic game for icebreaking; Towards the design of robotic ambiences as part of smart building services", abstract = "Social robots are entering our workplaces, homes, medical and educational systems in assistive and collaborative roles. In our research, we have investigated the use of a social robot Pepper as an interactive icebreaker host to create a positive atmosphere at events. This paper presents two user studies (total n=43) in which we evaluated two interactive prototypes of playful applications on Pepper, with the overall aim of providing a personal and entertaining service for event attendees. Data about users' experiences and attitudes were collected with semi-structured interviews, surveys, and observations. The results of the studies suggest that the majority of the participants had pleasurable and positive experiences with the robot and its applications. Moreover, their positive encounters led them to accept social robots as icebreaker hosts to connect with strangers. Based on our findings, we present a list of design implications to help the future design of social robots used to facilitate social connectedness, and to aid in the development of social robots as intelligent agents performing tasks as integrated parts of smart spaces.", keywords = "human robot interaction, ice breaking, smart building, social connectedness, social robots, user experience", author = "Nasim Beheshtian and Kirsikka Kaipainen and Kalle K{\"a}hk{\"o}nen and Aino Ahtinen", year = "2020", month = "1", day = "29", doi = "10.1145/3377290.3377292", language = "English", pages = "10--19", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{3b519186dff6436bbe0a39093d6800c9, title = "Demographic differences in accumulated types of capital in massively multiplayer online role-playing games", abstract = "This paper examines how the demographic attributes and extra-game habits of players of a Massively Multiplayer Online Role-Playing Game (MMORPG) predict the accumulated capital of their avatars. An online survey (N=905) was conducted amidst the players of Final Fantasy XIV (FFXIV). Four types of capital were measured to map out the concrete and intangible resources of the avatars; social, economic, cultural and symbolic. The results show that weekly time spent playing the game is the strongest predictor of avatar capital and was associated with all types of capital. Time subscribed to the game was associated with cultural, economic, symbolic and bonding social capital. Social capital was found to be highest amongst both young and female players. Forum activity was associated with symbolic capital.", keywords = "avatar, capital, demographics, MMORPG", author = "Henry Korkeila and Jonna Koivisto and Juho Hamari", year = "2020", month = "1", day = "29", doi = "10.1145/3377290.3377302", language = "English", pages = "74--82", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{c63ba2ca32e74f13b9f43dc07c868d9c, title = "Innovation challenges as a novel multidisciplinary learning platform", abstract = "Innovation Challenges is a new course offered for the whole Tampere university community by Y-kampus entrepreneurship and innovation services, for the first time in fall 2019. Innovation Challenges offers practice-based cases that allow students to develop their creativity and problem-solving skills in a team. Learning is anchored in team coaching pedagogy, learning-by-doing attitude and entrepreneurial mindset. In this paper, we first describe the evolution that created a course called Innovation Challenges. Then, we describe course organization and the six challenges that student teams are currently solving.", keywords = "innovation, learning platform, multidisciplinary projects", author = "Sini Jokiniemi and Jussi Myll{\"a}rniemi and Timo Poranen and Marika Vuorenmaa", note = "INT=comp,{"}Poranen, Timo{"}", year = "2020", month = "1", day = "29", doi = "10.1145/3377290.3377311", language = "English", pages = "145--148", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{f72e733aaf9544619ce2890b062a5546, title = "Satisfaction and willingness to consume immersive journalism: Experiment of differences between VR, 360 video, and article", abstract = "Immersive journalism has been touted to revolutionize journalism due to its ability to afford a multi-modal engrossing experience. However, hardly any experiments have been conducted whether consumers' satisfaction and consequent intentions to use immersive journalistic media may differ from traditional forms of journalistic content. Therefore, in this study, we investigate the differences in satisfaction and continued use intentions between article, 360 video and VR-based interaction with content. The data was collected via a randomized controlled laboratory experiment with between-subjects design (N = 87). Participants were randomly assigned to reading a written article based on the video (article) and watching the video on a computer screen (2D 360) or in mobile VR (VR 360). The collected data consisted of demographics (age and gender) and reported satisfaction and intention to continue use. Results suggest that those who were assigned to VR 360 had higher intentions to continue use, but not greater satisfaction than those in the other two conditions. However, the intention was predicted to an extent by satisfaction as suggested by previous literature. Finally, age and gender did not predict continued use. These findings imply that users prefer the new media technology for consuming journalism content and support previous findings of the relationship between satisfaction and intention to continue use. Finally, avenues for further research are presented.", keywords = "360-degree video, age, gender, immersive journalism, intention to continue use, satisfaction, virtual reality", author = "Mila Bujic and Juho Hamari", year = "2020", month = "1", day = "29", doi = "10.1145/3377290.3377310", language = "English", pages = "120--125", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{f2e515c153fa4db6b8bc3fe36b84b673, title = "Social human-robot interaction in the wild: A workshop proposal for academic mindtrek 2020", abstract = "This workshop will collect experts and stakeholders from all fields of human-robot interaction: both social and industrial applications and uses of robotics are of interest as far as they have human in the loop. The workshop will present recent and fully new research work in social HRI, including first results of a 3.5 month field trial and mixed-method study of a social robot Pepper in a shopping mall in Finland.", keywords = "collaborative robots, human-robot interaction, social robots", author = "Marketta Niemel{\"a} and Aino Ahtinen and Markku Turunen", note = "INT=comp,{"}Turunen, Markku{"}", year = "2020", month = "1", day = "29", doi = "10.1145/3377290.3377320", language = "English", pages = "168--169", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{8a7a21de03664089a4937e4e512eb7bd, title = "{"}The superhero of the university{"}: Experience-driven design and field study of the university guidance robot", abstract = "Robots have recently gained popularity in customer service. Especially social robots are nowadays utilized in healthcare, elderly homes and schools. Although it is crucial to design social robots according to well-defined user experience goals, research related to experience-driven design of social robots is still scarce. Experience-Driven Design (EDD) is a framework to design interaction for technology based on certain goals, known as experience goals. In this paper, we present the design and evaluation of the university guidance robot based on the user experience goals defined in previous research. The experience goals are nurture, fellowship and recreation. We designed applications, interaction, and robot's behavior to support the fulfillment of the experience goals. The social robot Pepper served as a platform for the university guidance robot. The evaluation was conducted as a field study in a university campus with 32 university students during the orientation week. According to our findings, the university guide robot successfully evoked nurture, fellowship and recreation among participants.", keywords = "experience-driven design, social robots, user experience", author = "Aparajita Chowdhury and Aino Ahtinen and Kirsikka Kaipainen", year = "2020", month = "1", day = "29", doi = "10.1145/3377290.3377304", language = "English", pages = "1--9", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@article{35d8f3f32fcd4eaa87595312a1281036, title = "Anthropometric clothing measurements from 3D body scans", abstract = "We propose a full processing pipeline to acquire anthropometric measurements from 3D measurements. The first stage of our pipeline is a commercial point cloud scanner. In the second stage, a pre-defined body model is fitted to the captured point cloud. We have generated one male and one female model from the SMPL library. The fitting process is based on non-rigid iterative closest point algorithm that minimizes overall energy of point distance and local stiffness energy terms. In the third stage, we measure multiple circumference paths on the fitted model surface and use a nonlinear regressor to provide the final estimates of anthropometric measurements. We scanned 194 male and 181 female subjects, and the proposed pipeline provides mean absolute errors from 2.5 to 16.0 mm depending on the anthropometric measurement.", keywords = "3D body model, Anthropometric measurement, Non-rigid ICP", author = "Song Yan and Johan Wirta and Joni-Kristian K{\"a}m{\"a}r{\"a}inen", year = "2020", doi = "10.1007/s00138-019-01054-4", language = "English", volume = "31", journal = "Machine Vision and Applications", issn = "0932-8092", publisher = "Springer", number = "1", }
@article{8aaf2eb696f94989a01820a824335de6, title = "Censor-Based Cooperative Multi-Antenna Spectrum Sensing with Imperfect Reporting Channels", abstract = "The present contribution proposes a spectrally efficient censor-based cooperative spectrum sensing (C-CSS) approach in a sustainable cognitive radio network that consists of multiple antenna nodes and experiences imperfect sensing and reporting channels. In this context, exact analytic expressions are first derived for the corresponding probability of detection, probability of false alarm, and secondary throughput, assuming that each secondary user (SU) sends its detection outcome to a fusion center only when it has detected a primary signal. Capitalizing on the findings of the analysis, the effects of critical measures, such as the detection threshold, the number of SUs, and the number of employed antennas, on the overall system performance are also quantified. In addition, the optimal detection threshold for each antenna based on the Neyman-Pearson criterion is derived and useful insights are developed on how to maximize the system throughput with a reduced number of SUs. It is shown that the C-CSS approach provides two distinct benefits compared with the conventional sensing approach, i.e., without censoring: i) the sensing tail problem, which exists in imperfect sensing environments, can be mitigated; and ii) less SUs are ultimately required to obtain higher secondary throughput, rendering the system more sustainable.", keywords = "censoring, cooperative spectrum sensing, energy detection, energy efficiency, imperfect reporting channels, multi-antenna systems, Sustainble computing", author = "Meiling Li and Omar Alhussein and Sofotasios, {Paschalis C.} and Sami Muhaidat and Yoo, {Paul D.} and Jie Liang and Anhong Wang", year = "2020", doi = "10.1109/TSUSC.2019.2896667", language = "English", volume = "5", pages = "48--60", journal = "IEEE Transactions on Sustainable Computing", issn = "2377-3782", number = "1", }
@inproceedings{dbe1d8a214a945408d1b4040d447a6af, title = "Exploration and exploitation of sensorimotor contingencies for a cognitive embodied agent", abstract = "The modelling of cognition is playing a major role in robotics. Indeed, robots need to learn, adapt and plan their actions in order to interact with their environment. To do so, approaches like embodiment and enactivism propose to ground sensorimotor experience in the robot's body to shape the development of cognition. In this work, we focus on the role of memory during learning in a closed loop. As sensorimotor contingencies, we consider a robot arm that moves a baby mobile toy to get visual reward. First, the robot explores the continuous sensorimotor space by associating visual stimuli to motor actions through motor babbling. After exploration, the robot uses the experience from its memory and exploits it, thus optimizing its motion to perceive more visual stimuli. The proposed approach uses Dynamic Field Theory and is integrated in the GummiArm, a 3D printed humanoid robot arm. The results indicate a higher visual neural activation after motion learning and show the benefits of an embodied babbling strategy.", keywords = "Cognitive Robotics, Dynamic Neural Fields, Embodiment, Sensorimotor Contingencies", author = "Quentin Houbre and Alexandre Angleraud and Roel Pieters", year = "2020", language = "English", series = "ICAART 2020 - Proceedings of the 12th International Conference on Agents and Artificial Intelligence", publisher = "SCITEPRESS", pages = "546--554", editor = "Ana Rocha and Luc Steels and {van den Herik}, Jaap", booktitle = "ICAART 2020 - Proceedings of the 12th International Conference on Agents and Artificial Intelligence", }
@article{54e430957b9a4ad98a429ee04f09923a, title = "Shearlet Transform-Based Light Field Compression under Low Bitrates", abstract = "Light field (LF) acquisition devices capture spatial and angular information of a scene. In contrast with traditional cameras, the additional angular information enables novel post-processing applications, such as 3D scene reconstruction, the ability to refocus at different depth planes, and synthetic aperture. In this paper, we present a novel compression scheme for LF data captured using multiple traditional cameras. The input LF views were divided into two groups: key views and decimated views. The key views were compressed using the multi-view extension of high-efficiency video coding (MV-HEVC) scheme, and decimated views were predicted using the shearlet-transform-based prediction (STBP) scheme. Additionally, the residual information of predicted views was also encoded and sent along with the coded stream of key views. The proposed scheme was evaluated over a benchmark multi-camera based LF datasets, demonstrating that incorporating the residual information into the compression scheme increased the overall peak signal to noise ratio (PSNR) by 2 dB. The proposed compression scheme performed significantly better at low bit rates compared to anchor schemes, which have a better level of compression efficiency in high bit-rate scenarios. The sensitivity of the human vision system towards compression artifacts, specifically at low bit rates, favors the proposed compression scheme over anchor schemes.", keywords = "Light field (LF) coding, multi-view extension of high-efficiency video coding (MV-HEVC), multiple camera system (MCS) coding, shearlet", author = "Waqas Ahmad and Suren Vagharshakyan and Marten Sjostrom and Atanas Gotchev and Robert Bregovic and Roger Olsson", year = "2020", doi = "10.1109/TIP.2020.2969087", language = "English", volume = "29", pages = "4269--4280", journal = "IEEE Transactions on Image Processing", issn = "1057-7149", publisher = "Institute of Electrical and Electronics Engineers", }
@inproceedings{c380d31f6480497a83362db285276e5f, title = "User experience of stereo and spatial audio in 360° live music videos", abstract = "360° music videos are becoming prevalent in music entertainment. Still, academic studies of the 360° live music experience covering both audio and visual experience are scarce. In this paper, we present a study of user experience of stereo and spatial audio in a 360° live music video setting with two different display types. The research was conducted in the form of a laboratory experiment, in which 20 participants watched and evaluated stereo and spatial audio versions of the same music video using a flat computer display and a head-mounted display (HMD). Based on the results, spatial audio combined with HMD scored highest in the quantitative metrics of perceived audio quality, presence, and overall listening experience. However, qualitative findings reveal that this combination does not fit well with users' listening habits. While nine participants preferred to use headphones to listen to music, thirteen participants viewed music listening as a secondary task-making the use of HMDs less suitable.", keywords = "360° video, ambisonics, head-mounted display, music video, spatial audio, stereo, user experience, virtual reality", author = "Jukka Holm and Kaisa V{\"a}{\"a}n{\"a}nen and Anas Battah", note = "EXT={"}Holm, Jukka{"} INT=comp,{"}Battah, Anas{"}", year = "2020", doi = "10.1145/3377290.3377291", language = "English", pages = "134--141", booktitle = "AcademicMindtrek 2020 - Proceedings of the 23rd International Academic Mindtrek Conference", publisher = "ACM", }
@article{f2ea0ad7f3234fe49d3746114de40bd0, title = "Bayesian receiver operating characteristic metric for linear classifiers", abstract = "We propose a novel classifier accuracy metric: the Bayesian Area Under the Receiver Operating Characteristic Curve (CBAUC). The method estimates the area under the ROC curve and is related to the recently proposed Bayesian Error Estimator. The metric can assess the quality of a classifier using only the training dataset without the need for computationally expensive cross-validation. We derive a closed-form solution of the proposed accuracy metric for any linear binary classifier under the Gaussianity assumption, and study the accuracy of the proposed estimator using simulated and real-world data. These experiments confirm that the closed-form CBAUC is both faster and more accurate than conventional AUC estimators.", keywords = "Bayesian error estimation, Classification, Receiver operating characteristic curve", author = "Hassan, {Syeda Sakira} and Heikki Huttunen and Jari Niemi and Jussi Tohka", note = "EXT={"}Tohka, Jussi{"}", year = "2019", month = "12", day = "1", doi = "10.1016/j.patrec.2019.07.016", language = "English", volume = "128", pages = "52--59", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{832ba21bb6694207a07d529387f09134, title = "Software architecture design in global software development: An empirical study", abstract = "In Global Software Development (GSD), the additional complexity caused by global distance requires processes to ease collaboration difficulties, reduce communication overhead, and improve control. How development tasks are broken down, shared and prioritized is key to project success. While the related literature provides some support for architects involved in GSD, guidelines are far from complete. This paper presents a GSD Architectural Practice Framework reflecting the views of software architects, all of whom are working in a distributed setting. In-depth interviews with architects from seven different GSD organizations revealed a complex set of challenges and practices. We found that designing software for distributed teams requires careful selection of practices that support understanding and adherence to defined architectural plans across sites. Teams used Scrum which aided communication, and Continuous Integration which helped solve synchronization issues. However, teams deviated from the design, causing conflicts. Furthermore, there needs to be a balance between the self-organizing Scrum team methodology and the need to impose architectural design decisions across distributed sites. The research presented provides an enhanced understanding of architectural practices in GSD companies. Our GSD Architectural Practice Framework gives practitioners a cohesive set of warnings, which for the most part, are matched by recommendations.", keywords = "Empirical study, Global software development, GSD, GSE, Scrum, Software architecture", author = "Outi Sievi-Korte and Ita Richardson and Sarah Beecham", year = "2019", month = "12", day = "1", doi = "10.1016/j.jss.2019.110400", language = "English", volume = "158", journal = "Journal of Systems and Software", issn = "0164-1212", publisher = "Elsevier", }
@inproceedings{06505456da4e4cbd82b476119a8015f2, title = "Promoting local culture and enriching airport experiences through interactive storytelling", abstract = "Experiences in airports may shape future travel plans and contribute to tourism destination development. However, a chaotic environment and time-consuming procedural routines in airports may result in negative associations towards the host country and its culture. Despite the existence of assistive airport applications, little attention is given to facilitating travelers’ engagement with cultural exploration. This paper introduces a concept of interactive personalized storytelling that provides both a cultural learning adventure and connection to local retailing. Our application generates an imaginative Finnish storyline unique to every user to guide them through local shops in the airport. A field evaluation was conducted with 15 travelers of different nationalities. Travelers perceived the interactive storytelling experience as an interesting and unique way to spend waiting time at the airport while increasing cultural exposure. Moreover, we found this method to be effective in persuading travelers to explore local products at the airport. Further, our results give insight to designing storytelling applications for large public places.", keywords = "Airport experience, Digital storytelling, Field study, Mobile application", author = "Alisa Burova and Chelsea Kelling and Tuuli Keskinen and Jaakko Hakulinen and Pekka Kallioniemi and Heli V{\"a}{\"a}t{\"a}j{\"a} and Markku Turunen", note = "EXT={"}V{\"a}{\"a}t{\"a}j{\"a}, Heli{"}", year = "2019", month = "11", day = "26", doi = "10.1145/3365610.3365640", language = "English", series = "ACM International Conference Proceeding Series", publisher = "Association for Computing Machinery", editor = "Giulio Jacucci and Fabio Paterno and Michael Rohs and Carmen Santoro", booktitle = "MUM 2019 - 18th International Conference on Mobile and Ubiquitous Multimedia, Proceedings", }
@article{90c8f9810e234c01be462ec4d45a58bb, title = "Programming languages for data-Intensive HPC applications: A systematic mapping study", abstract = "A major challenge in modelling and simulation is the need to combine expertise in both software technologies and a given scientific domain. When High-Performance Computing (HPC) is required to solve a scientific problem, software development becomes a problematic issue. Considering the complexity of the software for HPC, it is useful to identify programming languages that can be used to alleviate this issue. Because the existing literature on the topic of HPC is very dispersed, we performed a Systematic Mapping Study (SMS) in the context of the European COST Action cHiPSet. This literature study maps characteristics of various programming languages for data-intensive HPC applications, including category, typical user profiles, effectiveness, and type of articles. We organised the SMS in two phases. In the first phase, relevant articles are identified employing an automated keyword-based search in eight digital libraries. This lead to an initial sample of 420 papers, which was then narrowed down in a second phase by human inspection of article abstracts, titles and keywords to 152 relevant articles published in the period 2006–2018. The analysis of these articles enabled us to identify 26 programming languages referred to in 33 of relevant articles. We compared the outcome of the mapping study with results of our questionnaire-based survey that involved 57 HPC experts. The mapping study and the survey revealed that the desired features of programming languages for data-intensive HPC applications are portability, performance and usability. Furthermore, we observed that the majority of the programming languages used in the context of data-intensive HPC applications are text-based general-purpose programming languages. Typically these have a steep learning curve, which makes them difficult to adopt. We believe that the outcome of this study will inspire future research and development in programming languages for data-intensive HPC applications.", keywords = "Big data, Data-intensive applications, Domain-Specific language (DSL), General-Purpose language (GPL), High performance computing (HPC), Programming languages, Systematic mapping study (SMS)", author = "Vasco Amaral and Beatriz Norberto and Miguel Goul{\~a}o and Marco Aldinucci and Siegfried Benkner and Andrea Bracciali and Paulo Carreira and Edgars Celms and Lu{\'i}s Correia and Clemens Grelck and Helen Karatza and Christoph Kessler and Peter Kilpatrick and Hugo Martiniano and Ilias Mavridis and Sabri Pllana and Ana Resp{\'i}cio and Jos{\'e} Sim{\~a}o and Lu{\'i}s Veiga and Ari Visa", year = "2019", month = "11", day = "8", doi = "10.1016/j.parco.2019.102584", language = "English", volume = "91", journal = "Parallel Computing", issn = "0167-8191", publisher = "Elsevier", }
@article{39ac404698f748ebb8ca6e763d3ab270, title = "Action-Oriented Programming Model: Collective Executions and Interactions in the Fog", abstract = "Today's dominant design for the Internet of Things (IoT) is a Cloud-based system, where devices transfer their data to a back-end and in return receive instructions on how to act. This view is challenged when delays caused by communication with the back-end become an obstacle for IoT applications with, for example, stringent timing constraints. In contrast, Fog Computing approaches, where devices communicate and orchestrate their operations collectively and closer to the origin of data, lack adequate tools for programming secure interactions between humans and their proximate devices at the network edge. This paper fills the gap by applying Action-Oriented Programming (AcOP) model for this task. While originally the AcOP model was proposed for Cloud-based infrastructures, presently it is re-designed around the notion of coalescence and disintegration, which enable the devices to collectively and autonomously execute their operations in the Fog by serving humans in a peer-to-peer fashion. The Cloud's role has been minimized—it is being leveraged as a development and deployment platform.", keywords = "Edge computing, Fog Computing, Programming model, Proximity-based computing, Socio-technical systems", author = "Niko M{\"a}kitalo and Timo Aaltonen and Mikko Raatikainen and Aleksandr Ometov and Sergey Andreev and Yevgeni Koucheryavy and Tommi Mikkonen", note = "EXT={"}M{\"a}kitalo, Niko{"} EXT={"}Mikkonen, Tommi{"}", year = "2019", month = "11", day = "1", doi = "10.1016/j.jss.2019.110391", language = "English", volume = "157", journal = "Journal of Systems and Software", issn = "0164-1212", publisher = "Elsevier", }
@article{7e0c768f1b384389a0b20852eb3e1294, title = "Feasibility of FPGA accelerated IPsec on cloud", abstract = "Hardware acceleration for famous VPN solution, IPsec, has been widely researched already. Still it is not fully covered and the increasing latency, throughput, and feature requirements need further evaluation. We propose an IPsec accelerator architecture in an FPGA and explain the details that need to be considered for a production ready design. This research considers the IPsec packet processing without IKE to be offloaded on an FPGA in an SDN network. Related work performance rates in 64 byte packet size for throughput is 1–2 Gbps with 0.2 ms latency in software, and 1–4 Gbps with unknown latencies for hardware solutions. Our proposed architecture is capable to host 1000 concurrent tunnels and have 10 Gbps throughput with only 10 µs latency in our test network. Therefore the proposed design is efficient even with voice or video encryption. The architecture is especially designed for data centers and locations with vast number of concurrent IPsec tunnels. The research confirms that FPGA based hardware acceleration increases performance and is feasible to integrate with the other server infrastructure.", keywords = "Accelerator, IPsec, Offloading, SDN", author = "Markku Vajaranta and Arto Oinonen and H{\"a}m{\"a}l{\"a}inen, {Timo D.} and Vili Viitam{\"a}ki and J. Markunm{\"a}ki and Ari Kulmala", note = "EXT={"}Viitam{\"a}ki, Vili{"} EXT={"}Kulmala, Ari{"}", year = "2019", month = "11", day = "1", doi = "10.1016/j.micpro.2019.102861", language = "English", volume = "71", journal = "Microprocessors and Microsystems", issn = "0141-9331", publisher = "Elsevier", }
@article{6e3ded9b2e544668bc298e424611d227, title = "An icon that everyone wants to click: How perceived aesthetic qualities predict app icon successfulness", abstract = "Mobile app markets have been touted as fastest growing marketplaces in the world. Every day thousands of apps are published to join millions of others on app stores. The competition for top grossing apps and market visibility is fierce. The way an app is visually represented can greatly contribute to the amount of attention an icon receives and to its consequent commercial performance. Therefore, the icon of the app is of crucial importance as it is the first point of contact with the potential user/customer amidst the flood of information. Those apps that fail to arouse attention through their icons danger their commercial performance in the market where consumers browse past hundreds of icons daily. Using semantic differential scale (22 adjective pairs), we investigate the relationship between consumer perceptions of app icons and icon successfulness, measured by 1)overall evaluation of the icon, 2)willingness to click the icon, 3)willingness to download the imagined app and, 4)willingness to purchase the app. The study design was a vignette study with random participant (n = 569)assignment to evaluate 4 icons (n = 2276)from a total of pre-selected 68 game app icons across 4 categories (concrete, abstract, character and text). Results show that consumers are more likely to interact with app icons that are aesthetically pleasing and convey good quality. Particularly, app icons that are perceived unique, realistic and stimulating lead to more clicks, downloads and purchases.", keywords = "Aesthetics, Digital marketing, Graphical user interfaces, Iconography, Mobile apps, Semantic differential", author = "Henrietta Jylh{\"a} and Juho Hamari", year = "2019", month = "10", day = "1", doi = "10.1016/j.ijhcs.2019.04.004", language = "English", volume = "130", pages = "73--85", journal = "International Journal of Human-Computer Studies", issn = "1071-5819", publisher = "Elsevier", }
@article{889b650a014b42e497b30672f39f71cf, title = "Automatic word count estimation from daylong child-centered recordings in various language environments using language-independent syllabification of speech", abstract = "Automatic word count estimation (WCE) from audio recordings can be used to quantify the amount of verbal communication in a recording environment. One key application of WCE is to measure language input heard by infants and toddlers in their natural environments, as captured by daylong recordings from microphones worn by the infants. Although WCE is nearly trivial for high-quality signals in high-resource languages, daylong recordings are substantially more challenging due to the unconstrained acoustic environments and the presence of near- and far-field speech. Moreover, many use cases of interest involve languages for which reliable ASR systems or even well-defined lexicons are not available. A good WCE system should also perform similarly for low- and high-resource languages in order to enable unbiased comparisons across different cultures and environments. Unfortunately, the current state-of-the-art solution, the LENA system, is based on proprietary software and has only been optimized for American English, limiting its applicability. In this paper, we build on existing work on WCE and present the steps we have taken towards a freely available system for WCE that can be adapted to different languages or dialects with a limited amount of orthographically transcribed speech data. Our system is based on language-independent syllabification of speech, followed by a language-dependent mapping from syllable counts (and a number of other acoustic features) to the corresponding word count estimates. We evaluate our system on samples from daylong infant recordings from six different corpora consisting of several languages and socioeconomic environments, all manually annotated with the same protocol to allow direct comparison. We compare a number of alternative techniques for the two key components in our system: speech activity detection and automatic syllabification of speech. As a result, we show that our system can reach relatively consistent WCE accuracy across multiple corpora and languages (with some limitations). In addition, the system outperforms LENA on three of the four corpora consisting of different varieties of English. We also demonstrate how an automatic neural network-based syllabifier, when trained on multiple languages, generalizes well to novel languages beyond the training data, outperforming two previously proposed unsupervised syllabifiers as a feature extractor for WCE.", keywords = "Automatic syllabification, Daylong recordings, Language acquisition, Noise robustness, Word count estimation", author = "Okko R{\"a}s{\"a}nen and Shreyas Seshadri and Julien Karadayi and Eric Riebling and John Bunce and Alejandrina Cristia and Florian Metze and Marisa Casillas and Celia Rosemberg and Elika Bergelson and Melanie Soderstrom", year = "2019", month = "10", day = "1", doi = "10.1016/j.specom.2019.08.005", language = "English", volume = "113", pages = "63--80", journal = "Speech Communication", issn = "0167-6393", publisher = "Elsevier", }
@article{88ef34edc10a48e9bdaf80aa8075d5e4, title = "DevOps in practice: A multiple case study of five companies", abstract = "Context: DevOps is considered important in the ability to frequently and reliably update a system in operational state. DevOps presumes cross-functional collaboration and automation between software development and operations. DevOps adoption and implementation in companies is non-trivial due to required changes in technical, organisational and cultural aspects. Objectives: This exploratory study presents detailed descriptions of how DevOps is implemented in practice. The context of our empirical investigation is web application and service development in small and medium sized companies. Method: A multiple-case study was conducted in five different development contexts with successful DevOps implementations since its benefits, such as quick releases and minimum deployment errors, were achieved. Data was mainly collected through interviews with 26 practitioners and observations made at the companies. Data was analysed by first coding each case individually using a set of predefined themes and thereafter perform a cross-case synthesis. Results: Our analysis yielded some of the following results: (i) software development team attaining ownership and responsibility to deploy software changes in production is crucial in DevOps. (ii) toolchain usage and support in deployment pipeline activities accelerates the delivery of software changes, bug fixes and handling of production incidents. (ii) the delivery speed to production is affected by context factors, such as manual approvals by the product owner (iii) steep learning curve for new skills is experienced by both software developers and operations staff, who also have to cope with working under pressure. Conclusion: Our findings contributes to the overall understanding of DevOps concept, practices and its perceived impacts, particularly in small and medium sized companies. We discuss two practical implications of the results.", keywords = "Agile, Continuous deployment, Development, DevOps, Operations", author = "Lwakatare, {Lucy Ellen} and Terhi Kilamo and Teemu Karvonen and Tanja Sauvola and Ville Heikkil{\"a} and Juha Itkonen and Pasi Kuvaja and Tommi Mikkonen and Markku Oivo and Casper Lassenius", note = "EXT={"}Mikkonen, Tommi{"}", year = "2019", month = "10", day = "1", doi = "10.1016/j.infsof.2019.06.010", language = "English", volume = "114", pages = "217--230", journal = "Information and Software Technology", issn = "0950-5849", publisher = "Elsevier", }
@inproceedings{a4149f84eecf41e1b3ec74e4c2b028f7, title = "The Double Shadowed κ-μ Fading Model", abstract = "In this paper, we introduce a new fading model which is capable of characterizing both the shadowing of the dominant component and composite shadowing which may exist in wireless channels. More precisely, this new model assumes a κ-μ envelope where the dominant component is fluctuated by a Nakagami-m random variable (RV) which is preceded (or succeeded) by a secondary round of shadowing brought about by an inverse Nakagami-m RV. We conveniently refer to this as the double shadowed κ-μ fading model. In this context, novel closed-form and analytical expressions are developed for a range of channel related statistics, such as the probability density function, cumulative distribution function, and moments. All of the derived expressions have been validated through Monte-Carlo simulations and reduction to a number of well-known special cases. It is worth highlighting that the proposed fading model offers remarkable flexibility as it includes the κ-μ, η-μ, Rician shadowed, double shadowed Rician, κ-μ shadowed, κ-μ/inverse gamma and η-μ/inverse gamma distributions as special cases.", author = "Nidhi Simmons and {Nogueira Da Silva}, {Carlos Rafael} and Cotton, {Simon L.} and Sofotasios, {Paschalis C.} and {Ki Yoo}, Seong and Yacoub, {Michel Daoud}", year = "2019", month = "10", day = "1", doi = "10.1109/WiMOB.2019.8923336", language = "English", series = "International Conference on Wireless and Mobile Computing, Networking and Communications", publisher = "IEEE", booktitle = "2019 International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2019", }
@article{f6bc4bc1e6de41e3a0655bfbf720fb25, title = "Tunable VVC Frame Partitioning based on Lightweight Machine Learning", abstract = "Block partition structure is a critical module in video coding scheme to achieve significant gap of compression performance. Under the exploration of the future video coding standard, named Versatile Video Coding (VVC), a new Quad Tree Binary Tree (QTBT) block partition structure has been introduced. In addition to the QT block partitioning defined in High Efficiency Video Coding (HEVC) standard, new horizontal and vertical BT partitions are enabled, which drastically increases the encoding time compared to HEVC. In this paper, we propose a lightweight and tunable QTBT partitioning scheme based on a Machine Learning (ML) approach. The proposed solution uses Random Forest classifiers to determine for each coding block the most probable partition modes. To minimize the encoding loss induced by misclassification, risk intervals for classifier decisions are introduced in the proposed solution. By varying the size of risk intervals, tunable trade-off between encoding complexity reduction and coding loss is achieved. The proposed solution implemented in the JEM-7.0 software offers encoding complexity reductions ranging from 30average for only 0.7{\%} to 3.0{\%} Bjxntegaard Delta Rate (BDBR) increase in Random Access (RA) coding configuration, with very slight overhead induced by Random Forest. The proposed solution based on Random Forest classifiers is also efficient to reduce the complexity of the Multi-Type Tree (MTT) partitioning scheme under the VTM-5.0 software, with complexity reductions ranging from 25{\%} to 61{\%} in average for only 0.4{\%} to 2.2{\%} BD-BR increase.", keywords = "Complexity Reduction, JEM, Machine Learning, QTBT, Random Forest, Video Compression, VTM, VVC", author = "Thomas Amestoy and Alexandre Mercat and Wassim Hamidouche and Daniel Menard and Cyril Bergeron", year = "2019", month = "9", day = "6", doi = "10.1109/TIP.2019.2938670", language = "English", journal = "IEEE Transactions on Image Processing", issn = "1057-7149", publisher = "Institute of Electrical and Electronics Engineers", }
@article{cd9abceb7b2543f3b83e128d120ee044, title = "Performance analysis of single-query 6-DoF camera pose estimation in self-driving setups", abstract = "In this work, we consider the problem of single-query 6-DoF camera pose estimation, i.e. estimating the position and orientation of a camera by using reference images and a point cloud. We perform a systematic comparison of three state-of-the-art strategies for 6-DoF camera pose estimation: feature-based, photometric-based and mutual-information-based approaches. Two standard datasets with self-driving setups are used for experiments, and the performance of the studied methods is evaluated in terms of success rate, translation error and maximum orientation error. Building on the analysis of the results, we evaluate a hybrid approach that combines feature-based and mutual-information-based pose estimation methods to benefit from their complementary properties for pose estimation. Experiments show that (1) in cases with large appearance change between query and reference, the hybrid approach outperforms feature-based and mutual-information-based approaches by an average increment of 9.4{\%} and 8.7{\%} in the success rate, respectively; (2) in cases where query and reference images are captured at similar imaging conditions, the hybrid approach performs similarly as the feature-based approach, but outperforms both photometric-based and mutual-information-based approaches with a clear margin; (3) the feature-based approach is consistently more accurate than mutual-information-based and photometric-based approaches when at least 4 consistent matching points are found between the query and reference images.", keywords = "3D point cloud, Camera pose estimation, Hybrid method, Mutual information, Photometric matching, Self driving car", author = "Junsheng Fu and Said Pertuz and Jiri Matas and Joni-Kristian K{\"a}m{\"a}r{\"a}inen", note = "EXT={"}Matas, Jiri{"}", year = "2019", month = "9", doi = "10.1016/j.cviu.2019.04.009", language = "English", volume = "186", pages = "58--73", journal = "Computer Vision and Image Understanding", issn = "1077-3142", publisher = "ACADEMIC PRESS INC ELSEVIER SCIENCE", }
@inproceedings{8f6b41ac87f34df4ada1df8b1a4e5be0, title = "Game postmortems vs. developer Reddit AMAs: Computational analysis of developer communication", abstract = "Postmortems and Reddit Ask Me Anything (AMA) threads represent communications of game developers through two different channels about their game development experiences, culture, processes, and practices. We carry out a quantitative text mining based comprehensive analysis of online available postmortems and AMA threads from game developers over multiple years. We find and analyze underlying topics from the postmortems and AMAs as well as their variation among the data sources and over time. The analysis is done based on structural topic modeling, a probabilistic modeling technique for text mining. The extracted topics reveal differing and common interests as well as their evolution of prevalence over time in the two text sources. We have found that postmortems put more emphasis on detail-oriented development aspects as well as technically-oriented game design problems whereas AMAs feature a wider variety of discussion topics that are related to a more general game development process, game-play and game-play experience related game design. The prevalences of the topics also evolve differently over time in postmortems versus AMAs.", keywords = "Game development, Literature analysis, Postmortem analysis, Reddit, Text mining", author = "Chien Lu and Jaakko Peltonen and Timo Nummenmaa", note = "INT=comp,{"}Peltonen, Jaakko{"} INT=comp,{"}Lu, Chien{"}", year = "2019", month = "8", day = "26", doi = "10.1145/3337722.3337727", language = "English", editor = "Foaad Khosmood and Johanna Pirker and Thomas Apperley and Sebastian Deterding", booktitle = "Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019", publisher = "ACM", }
@inproceedings{779cc2d1cd0e46a2a137f85333b6777b, title = "Social features in hybrid board game marketing material", abstract = "This paper identifies 7 key social features which appear in the marketing and promotional material of hybrid board games. The features are identified by exploring sources such as game websites and game boxes of 13 hybrid board game products. The material is analyzed in order to determine how social features related to hybrid game features are presented. As a result of the analysis, it became apparent that there are certain key social features which are presented as being important to players. The knowledge generated in this work acts as a view to how the industry sees hybridity in games as a tool for supporting social interaction, and how the industry wants to message it to consumers when they explore promotional material. The identified key social features can also be used as design knowledge for developing new games, as they give insight into popular social features in hybrid board games.", keywords = "Board games, Design, Hybrid games, Marketing", author = "Timo Nummenmaa and Ville Kankainen", note = "INT=comp,{"}Kankainen, Vill{"}", year = "2019", month = "8", day = "26", doi = "10.1145/3337722.3341864", language = "English", editor = "Foaad Khosmood and Johanna Pirker and Thomas Apperley and Sebastian Deterding", booktitle = "Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019", publisher = "ACM", }
@article{7c020601f63343049f454d3683d3cf6c, title = "Are architectural smells independent from code smells? An empirical study", abstract = "Background. Architectural smells and code smells are symptoms of bad code or design that can cause different quality problems, such as faults, technical debt, or difficulties with maintenance and evolution. Some studies show that code smells and architectural smells often appear together in the same file. The correlation between code smells and architectural smells, however, is not clear yet; some studies on a limited set of projects have claimed that architectural smells can be derived from code smells, while other studies claim the opposite. Objective. The goal of this work is to understand whether architectural smells are independent from code smells or can be derived from a code smell or from one category of them. Method. We conducted a case study analyzing the correlations among 19 code smells, six categories of code smells, and four architectural smells. Results. The results show that architectural smells are correlated with code smells only in a very low number of occurrences and therefore cannot be derived from code smells. Conclusion. Architectural smells are independent from code smells, and therefore deserve special attention by researchers, who should investigate their actual harmfulness, and practitioners, who should consider whether and when to remove them.", keywords = "Architectural smells, Code smells, Empirical analysis, Technical debt", author = "{Arcelli Fontana}, Francesca and Valentina Lenarduzzi and Riccardo Roveda and Davide Taibi", year = "2019", month = "8", day = "1", doi = "10.1016/j.jss.2019.04.066", language = "English", volume = "154", pages = "139--156", journal = "Journal of Systems and Software", issn = "0164-1212", publisher = "Elsevier", }
@inproceedings{e03e940fed464c018575365cc7843958, title = "Enabling cybersecurity incident reporting and coordinated handling for maritime sector", abstract = "The maritime industry is experiencing a new era of digital transformation. At the same time as the number of cyberattacks and cybersecurity incidents are increasing, cybersecurity awareness and incident reporting in this sector remains low. In this paper, we describe a cybersecurity incident reporting system for the maritime industry that aims to address this issue. The work focuses on autonomous and unmanned vessels, but can be equally applied to other areas of the maritime industry. The proposed approach has been evaluated experimentally and the results demonstrate its applicability and feasibility.", keywords = "Cybersecurity incident exchange, Maritime cybersecurity, Smart ports, Smart ships", author = "Bilhanan Silverajan and Petteri Vistiaho", year = "2019", month = "8", day = "1", doi = "10.1109/AsiaJCIS.2019.000-1", language = "English", pages = "88--95", booktitle = "2019 14th Asia Joint Conference on Information Security, AsiaJCIS 2019", publisher = "IEEE", }
@article{4faa5840abde4a0cbb3eb71eeecf8bd6, title = "Hermitian normalized Laplacian matrix for directed networks", abstract = "In this paper, we extend and generalize the spectral theory of undirected networks towards directed networks by introducing the Hermitian normalized Laplacian matrix for directed networks. In order to start, we discuss the Courant–Fischer theorem for the eigenvalues of Hermitian normalized Laplacian matrix. Based on the Courant–Fischer theorem, we obtain a similar result towards the normalized Laplacian matrix of undirected networks: for each i ∈ {1, 2,…, n}, any eigenvalue of Hermitian normalized Laplacian matrix λ i ∈ [0, 2]. Moreover, we prove some special conditions if 0, or 2 is an eigenvalue of the Hermitian normalized Laplacian matrix L(X). On top of that, we investigate the symmetry of the eigenvalues of L(X)and the edge-version for the eigenvalue interlacing result. Finally we present two expressions for the coefficients of the characteristic polynomial of the Hermitian normalized Laplacian matrix. As an outlook, we sketch some novel and intriguing problems to which our apparatus could generally be applied.", keywords = "Characteristic polynomial, Courant–Fischer theorem, Directed networks, Eigenvalue interlacing inequality, Hermitian normalized Laplacian matrix", author = "Guihai Yu and Matthias Dehmer and Frank Emmert-Streib and Herbert Jodlbauer", year = "2019", month = "8", day = "1", doi = "10.1016/j.ins.2019.04.049", language = "English", volume = "495", pages = "175--184", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@inproceedings{3e143e8b41814e838bf2492371bfde91, title = "Real-time online drilling vibration analysis using data mining", abstract = "While the data mining intermediaries play a critical role in the rock drilling industry, they also tend to provide an optimized real-time model for the drilling systems. In addition, proper online tool condition monitoring (OTOM) methods can improve the drilling performance by accessing real-time data. Hence, OTOM methods assist depreciating error and detect unspecified faults at early stages. In this study, we proposed appropriate OTOM algorithms to develop and enhance the quality of real-time systems and provide a solution to detect and categorize various stages of drilling operation with the aid of vibration signals (especially in terms of acceleration or velocity). In particular, the proposed methods in this article perform based on statistical approaches. Therefore, in order to recognize the drilling stages, we measured the Root Mean Square (RMS) values corresponding to the acceleration signals. In the meantime, we also succeeded to distinguish the drilling stages by employing estimated power spectral density (PSD) in the frequency domain. The acquired results in this publication confirm the real-time prediction and classification potential of the proposed methods for the different drilling stages and especially for the rock drilling engineering.", keywords = "Data mining, Drilling stages, Real-time, Statistical analysis", author = "Marzieh Zare and Mikko Huova and Ari Visa and Sirpa Launis", year = "2019", month = "7", day = "19", doi = "10.1145/3352411.3352439", language = "English", pages = "175--180", booktitle = "Proceedings of the 2019 2nd International Conference on Data Science and Information Technology, DSIT 2019", publisher = "ACM", }
@article{0780d0ff519246728af1b82f381aa1f3, title = "High-performance SIMD implementation of the lattice-Boltzmann method on the Xeon Phi processor", abstract = "We present a high-performance implementation of the lattice-Boltzmann method (LBM) on the Knights Landing generation of Xeon Phi. The Knights Landing architecture includes 16GB of high-speed memory (MCDRAM) with a reported bandwidth of over 400 GB/s, and a subset of the AVX-512 single instruction multiple data (SIMD) instruction set. We explain five critical implementation aspects for high performance on this architecture: (1) the choice of appropriate LBM algorithm, (2) suitable data layout, (3) vectorization of the computation, (4) data prefetching, and (5) running our LBM simulations exclusively from the MCDRAM. The effects of these implementation aspects on the computational performance are demonstrated with the lattice-Boltzmann scheme involving the D3Q19 discrete velocity set and the TRT collision operator. In our benchmark simulations of fluid flow through porous media, using double-precision floating-point arithmetic, the observed performance exceeds 960 million fluid lattice site updates per second.", keywords = "Lattice Boltzmann, prefetching, SIMD, Xeon Phi", author = "Fredrik Roberts{\'e}n and Keijo Mattila and Jan Westerholm", year = "2019", month = "7", day = "10", doi = "10.1002/cpe.5072", language = "English", volume = "31", journal = "Concurrency and Computation: Practice and Experience", issn = "1532-0626", publisher = "Wiley", number = "13", }
@inproceedings{37cd86b75b84459cbfe9bf18c0fc8281, title = "Detection of Typical Pronunciation Errors in Non-native English Speech Using Convolutional Recurrent Neural Networks", abstract = "A machine learning method for the automatic detection of pronunciation errors made by non-native speakers of English is proposed. It consists of training word-specific binary classifiers on a collected dataset of isolated words with possible pronunciation errors, typical for Finnish native speakers. The classifiers predict whether the typical error is present in the given word utterance. They operate on sequences of acoustic features, extracted from consecutive frames of an audio recording of a word utterance. The proposed architecture includes a convolutional neural network, a recurrent neural network, or a combination of the two. The optimal topology and hyperpa-rameters are obtained in a Bayesian optimisation setting using a tree-structured Parzen estimator. A dataset of 80 words uttered naturally by 120 speakers is collected. The performance of the proposed system, evaluated on a well-represented subset of the dataset, shows that it is capable of detecting pronunciation errors in most of the words (46/49) with high accuracy (mean accuracy gain over the zero rule 12.21 percent points).", keywords = "Computer-assisted language learning, computer-assisted pronunciation training CNN, CRNN, GRU, pronunciation learning", author = "Aleksandr Diment and Eemi Fagerlund and Adrian Benfield and Tuomas Virtanen", note = "jufoid=58177", year = "2019", month = "7", day = "1", doi = "10.1109/IJCNN.2019.8851963", language = "English", publisher = "IEEE", booktitle = "2019 International Joint Conference on Neural Networks, IJCNN 2019", }
@inproceedings{b1f0787dd0ed4f8491120bd9255ff764, title = "User Experience Study of 360° Music Videos on Computer Monitor and Virtual Reality Goggles", abstract = "360° videos are increasingly used for media and entertainment, but the best practices for editing them are not yet well established. In this paper, we present a study in which we investigated the user experience of 360° music videos viewed on computer monitor and VR goggles. The research was conducted in the form of a laboratory experiment with 20 test participants. During the within-subject study, participants watched and evaluated four versions of the same 360° music video with a different cutting rate. Based on the results, an average cutting rate of 26 seconds delivered the highest-quality user experience both for computer monitor and VR goggles. The cutting rate matched with participants' mental models, and there was enough time to explore the environment without getting bored. Faster cutting rates made the users nervous, and a video consisting of a single shot was considered to be too static and boring.", keywords = "360° video, cutting rate, hmd, music video, virtual reality, virtual reality goggles", author = "Jukka Holm and Kaisa V{\"a}{\"a}n{\"a}nen and Remans, {Mohammad Mushfiqur Rahman}", note = "jufoid=58079 EXT={"}Holm, Jukka{"} INT=comp,{"}Remans, Mohammad Mushfiqur Rahman{"}", year = "2019", month = "7", day = "1", doi = "10.1109/IV.2019.00023", language = "English", series = "Proceedings of the International Conference on Information Visualisation", publisher = "IEEE", pages = "81--87", editor = "Ebad Banissi and Anna Ursyn and {McK. Bannatyne}, {Mark W.} and Nuno Datia and Pires, {Joao Moura} and Rita Francese and Muhammad Sarfraz and Wyeld, {Theodor G} and Fatma Bouali and Gilles Venturin and Hanane Azzag and Mustapha Lebbah and Marjan Trutschl and Urska Cvek and Heimo Muller and Minoru Nakayama and Sebastian Kernbach and Loredana Caruccio and Michele Risi and Ugo Erra and Autilia Vitiello and Veronica Rossano", booktitle = "Information Visualization - Biomedical Visualization and Geometric Modelling and Imaging, IV 2019", }
@inproceedings{4d9e3c52c856462a8144652e69988b0e, title = "Public and open HEVC encoding service in the cloud", abstract = "The ability to record vast amounts of video content requires convenient and efficient video coding services with which users can tackle the limited storage and transmission capacities. This paper presents an open-source cloud service for encoding raw video formats and transcoding compressed videos to the latest HEVC/H.265 format. Respective commercial transcoding services are available on the Internet but they are behind a paywall. On the other hand, using command-line interfaces of existing open-source software solutions requires in-depth knowledge of the coding process to attain the best coding gain and speed. The proposed service is available online, it is free to use without any registration, and its easy-to-use web interface makes it feasible for non-technical users. It is built on the FFmpeg multimedia framework whose built-in decoders accept various input video formats that are then compressed to HEVC with a full-fledged Kvazaar open-source encoder.", keywords = "Cloud en/transcoding, FFmpeg, High efficiency video coding (HEVC), Kvazaar HEVC encoder, Software as a service (SaaS)", author = "Aaro Altonen and Marko Viitanen and Joni R{\"a}s{\"a}nen and Alexandre Mercat and Jarno Vanne", year = "2019", month = "6", day = "18", doi = "10.1145/3304109.3323834", language = "English", pages = "300--303", booktitle = "Proceedings of the 10th ACM Multimedia Systems Conference, MMSys 2019", publisher = "ACM", }
@inproceedings{e25100775a36432892de4656f62b5e0f, title = "Investigation of egocentric social structures for diversity-enhancing followee recommendations", abstract = "The increasing amount of data in social media enables new advanced user modeling approaches. This paper focuses on user profiling for diversity-enhancing recommender systems for finding new followees on Twitter. By combining social network analysis with Latent Dirichlet Allocation based content analysis, we defined three egocentric structural positions on the network extracted from Twitter data: Mentions of Mentions, Community Cluster, Dormant Ties (and the rest as a baseline condition). In addition to describing the data analysis procedure, we report preliminary empirical findings on a user-centered evaluation study of recommendations based on the proposed matching strategy and the presented structural positions. The investigation of the possible overlaps of the groups and the participants' evaluations of perceived relevance of the recommendation imply that the three positions are sufficiently mutually exclusive and thus could serve as new diversity-enhancing mechanisms in various people recommender systems.", keywords = "Hybrid recommendation system, People recommender system, Social network analysis, Social recommender system, Twitter analytics, User modeling for social matching", author = "Erjon Skenderi and Ekaterina Olshannikova and Thomas Olsson and Jukka Huhtam{\"a}ki and Sami Koivunen and Peng Yao and Heikki Huttunen", year = "2019", month = "6", day = "6", doi = "10.1145/3314183.3323460", language = "English", pages = "257--261", booktitle = "ACM UMAP 2019 Adjunct - Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization", publisher = "ACM", }
@inproceedings{de2ae49b9e744fc5874ab85e950131b2, title = "Facilitating the first move: Exploring inspirational design patterns for aiding initiation of social encounters", abstract = "Actualizing positive social encounters remains both a key ends and means in many activities to foster a sense of community. Initiating encounters between strangers typically requires facilitative activities or artefacts, such as icebreakers or tickets-to-talk. However, there is little understanding of which designs are effective and why, and the broad design space remains largely underexplored. We address this challenge by presenting five candidates for inspirational design patterns on signaling social intentions and identifying impediments that deter commencement of encounters. The principles result from an extensive review of design cases and public art installations. Through focus groups and expert interviews, we assessed the perceived applicability and social acceptance of the proposed patterns. Three new design principles relating to the risks of initiating an encounter emerged through analyzing participant responses. These articulations of possible approaches and pitfalls for increasing conviviality may broaden the repertoire of, and support discussion between designers and others concerned with collocated social interaction.", keywords = "Collocated interaction, Design patterns, Social encounters, Social encouragement, Social interaction design, Ticket-to-talk", author = "Robb Mitchell and Thomas Olsson", year = "2019", month = "6", day = "3", doi = "10.1145/3328320.3328396", language = "English", pages = "283--294", editor = "Hilda Tellioglu and Florian Cech", booktitle = "C&T 2019 - 9th International Conference on Communities and Technologies, Conference Proceedings", publisher = "ACM", }
@inproceedings{d68bd335080b49e8904dbc315d47902a, title = "Towards Efficient Code Generation for Exposed Datapath Architectures", abstract = "Coarse-grained reconfigurable architectures and other exposed datapath architectures such as transport-triggered architectures come with a high energy efficiency promise for accelerating data oriented workloads. Their main drawback results from the push of complexity from the architecture to the programmer; compiler techniques that allow starting from a higher-level programming language and generate code efficiently to such architectures robustly is still an open research area. In this article we survey the known main sources of challenges and outline a generic processor architecture template that covers the most common architecture variations along with a proposal for a common code generation framework for such challenging architectures.", keywords = "CGRA, code generation, energy efficiency, reconfigurable architectures, scheduling, TTA", author = "Kanishkan Vadivel and Roel Jordans and Sander Stujik and Henk Corporaal and Pekka J{\"a}{\"a}skel{\"a}inen and Heikki Kultala", year = "2019", month = "5", day = "27", doi = "10.1145/3323439.3323990", language = "English", pages = "86--89", editor = "Sander Stuijk", booktitle = "Proceedings of the 22nd International Workshop on Software and Compilers for Embedded Systems, SCOPES 2019", publisher = "ACM", }
@inproceedings{4dfbececdbeb4b9d8603e34868727123, title = "1-D Convolutional Neural Networks for Signal Processing Applications", abstract = "1D Convolutional Neural Networks (CNNs) have recently become the state-of-the-art technique for crucial signal processing applications such as patient-specific ECG classification, structural health monitoring, anomaly detection in power electronics circuitry and motor-fault detection. This is an expected outcome as there are numerous advantages of using an adaptive and compact 1D CNN instead of a conventional (2D) deep counterparts. First of all, compact 1D CNNs can be efficiently trained with a limited dataset of 1D signals while the 2D deep CNNs, besides requiring 1D to 2D data transformation, usually need datasets with massive size, e.g., in the »Big Data» scale in order to prevent the well-known »overfitting» problem. 1D CNNs can directly be applied to the raw signal (e.g., current, voltage, vibration, etc.) without requiring any pre- or post-processing such as feature extraction, selection, dimension reduction, denoising, etc. Furthermore, due to the simple and compact configuration of such adaptive 1D CNNs that perform only linear 1D convolutions (scalar multiplications and additions), a real-time and low-cost hardware implementation is feasible. This paper reviews the major signal processing applications of compact 1D CNNs with a brief theoretical background. We will present their state-of-the-art performances and conclude with focusing on some major properties. Keywords - 1-D CNNs, Biomedical Signal Processing, SHM.", author = "Serkan Kiranyaz and Turker Ince and Osama Abdeljaber and Onur Avci and Moncef Gabbouj", note = "EXT={"}Kiranyaz, Serkan{"} EXT={"}Ince, Turker{"}", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8682194", language = "English", pages = "8360--8364", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", publisher = "IEEE", }
@inproceedings{bc40510d0ab84e148ae5d448e1a17931, title = "Convex Energy Optimization of Streaming Applications for MPSoCs", abstract = "The energy efficiency of modern MPSoCs is enhanced by complex hardware features such as Dynamic Voltage and Frequency Scaling (DVFS) and Dynamic Power Management (DPM). This paper introduces a new method, based on convex problem solving, that determines the most energy efficient operating point in terms of frequency and number of active cores in an MPSoC. The solution can challenge the popular approaches based on never-idle (or As-Slow-As-Possible (ASAP)) and race-to-idle (or As-Fast-As-Possible (AFAP)) principles. Experimental data are reported using a Samsung Exynos 5410 MPSoC and show a reduction in energy of up to 27 {\%} when compared to ASAP and AFAP.", author = "E. Nogues and A. Mercat and F. Arrestier and M. Pelcat and D. Menard", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8682317", language = "English", pages = "1557--1561", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", publisher = "IEEE", }
@inproceedings{edc91941237c41c1acea4e8171aab42a, title = "Deep Reinforcement Learning for Financial Trading Using Price Trailing", abstract = "Developing accurate financial analysis tools can be useful both for speculative trading, as well as for analyzing the behavior of markets and promptly responding to unstable conditions ensuring the smooth operation of the financial markets. This led to the development of various methods for analyzing and forecasting the behaviour of financial assets, ranging from traditional quantitative finance to more modern machine learning approaches. However, the volatile and unstable behavior of financial markets forbids the accurate prediction of future prices, reducing the performance of these approaches. In contrast, in this paper we propose a novel price trailing method that goes beyond traditional price forecasting by reformulating trading as a control problem, effectively overcoming the aforementioned limitations. The proposed method leads to developing robust agents that can withstand large amounts of noise, while still capturing the price trends and allowing for taking profitable decisions.", keywords = "Deep Reinforcement Learning, Financial Markets, Price Forecasting, Trading", author = "Zarkias, {Konstantinos Saitas} and Nikolaos Passalis and Avraam Tsantekidis and Anastasios Tefas", note = "EXT={"}Tefas, Anastasios{"}", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8683161", language = "English", pages = "3067--3071", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", publisher = "IEEE", }
@inproceedings{f7e36ea81af74b478e05cae5e40dc75e, title = "Deep Temporal Logistic Bag-of-features for Forecasting High Frequency Limit Order Book Time Series", abstract = "Forecasting time series has several applications in various domains. The vast amount of data that are available nowadays provide the opportunity to use powerful deep learning approaches, but at the same time pose significant challenges of high-dimensionality, velocity and variety. In this paper, a novel logistic formulation of the well-known Bag-of-Features model is proposed to tackle these challenges. The proposed method is combined with deep convolutional feature extractors and is capable of accurately modeling the temporal behavior of time series, forming powerful forecasting models that can be trained in an end-to-end fashion. The proposed method was extensively evaluated using a large-scale financial time series dataset, that consists of more than 4 million limit orders, outperforming other competitive methods.", keywords = "Limit Order Book, Temporal Bag-of-Features, Time series forecasting", author = "Nikolaos Passalis and Anastasios Tefas and Juho Kanniainen and Moncef Gabbouj and Alexandros Iosifidis", note = "EXT={"}Tefas, Anastasios{"} EXT={"}Iosifidis, Alexandros{"}", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8682297", language = "English", pages = "7545--7549", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", publisher = "IEEE", }
@inproceedings{e822f6d929dd48f7a6dd5a2a2c4e78ad, title = "Low-latency Deep Clustering for Speech Separation", abstract = "This paper proposes a low algorithmic latency adaptation of the deep clustering approach to speaker-independent speech separation. It consists of three parts: a) the usage of long-short-term-memory (LSTM) networks instead of their bidirectional variant used in the original work, b) using a short synthesis window (here 8 ms) required for low-latency operation, and, c) using a buffer in the beginning of audio mixture to estimate cluster centres corresponding to constituent speakers which are then utilized to separate speakers within the rest of the signal. The buffer duration would serve as an initialization phase after which the system is capable of operating with 8 ms algorithmic latency. We evaluate our proposed approach on two-speaker mixtures from Wall Street Journal (WSJ0) corpus. We observe that the use of LSTM yields around one dB lower SDR as compared to the baseline bidirectional LSTM in terms of source to distortion ratio (SDR). Moreover, using an 8 ms synthesis window instead of 32 ms degrades the separation performance by around 2.1 dB as compared to the baseline. Finally, we also report separation performance with different buffer durations noting that separation can be achieved even for buffer duration as low as 300 ms.", keywords = "Deep clustering, Low latency, Monaural speech separation", author = "Shanshan Wang and Gaurav Naithani and Tuomas Virtanen", note = "int=comp,{"}Wang, Shanshan{"}", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8683437", language = "English", pages = "76--80", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", publisher = "IEEE", }
@inproceedings{05404b4ccd934b5ba65635c6350644f3, title = "Random Forest Oriented Fast QTBT Frame Partitioning", abstract = "Block partition structure is a critical module in video coding scheme to achieve significant gap of compression performance. Under the exploration of future video coding standard by the Joint Video Exploration Team (JVET), named Versatile Video Coding (VVC), a new Quad Tree Binary Tree (QTBT) block partition structure has been introduced. In addition to the QT block partitioning defined by High Efficiency Video Coding (HEVC) standard, new horizontal and vertical BT partitions are enabled, which drastically increases the encoding time compared to HEVC. In this paper, we propose a fast QTBT partitioning scheme based on a Machine Learning approach. Complementary to techniques proposed in literature to reduce the complexity of HEVC Quad Tree (QT) partitioning, the propose solution uses Random Forest classifiers to determine for each block which partition modes between QT and BT is more likely to be selected. Using uncertainty zones of classifier decisions, the proposed complexity reduction technique is able to reduce in average by 30{\%} the encoding time of JEM-v7.0 software in Random Access configuration with only 0.57{\%} Bjontegaard Delta Rate (BD-BR) increase.", keywords = "Complexity Reduction, JEM, Machine Learning, QTBT, Random Forest, Video Compression, VVC", author = "Thomas Amestoy and Alexandre Mercat and Wassim Hamidouche and Cyril Bergeron and Daniel Menard", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8683413", language = "English", pages = "1837--1841", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", publisher = "IEEE", }
@inproceedings{bf3f083cc3d748f1b7bb273e769e5a97, title = "Time Difference of Arrival Estimation of Speech Signals Using Deep Neural Networks with Integrated Time-frequency Masking", abstract = "The Time Difference of Arrival (TDoA) of a sound wavefront impinging on a microphone pair carries spatial information about the source. However, captured speech typically contains dynamic non-speech interference sources and noise. Therefore, the TDoA estimates fluctuate between speech and interference. Deep Neural Networks (DNNs) have been applied for Time-Frequency (TF) masking for Acoustic Source Localization (ASL) to filter out non-speech components from a speaker location likelihood function. However, the type of TF mask for this task is not obvious. Secondly, the DNN should estimate the TDoA values, but existing solutions estimate the TF mask instead. To overcome these issues, a direct formulation of the TF masking as a part of a DNN-based ASL structure is proposed. Furthermore, the proposed network operates in an online manner, i.e., producing estimates frame-by-frame. Combined with the use of recurrent layers it exploits the sequential progression of speaker related TDoAs. Training with different microphone spacings allows model re-use for different microphone pair geometries in inference. Real-data experiments with smartphone recordings of speech in interference demonstrate the network's generalization capability.", keywords = "Acoustic Source Localization, Microphone Arrays, Recurrent Neural Networks, Time-Frequency Masking", author = "Pasi Pertil{\"a} and Mikko Parviainen", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8682574", language = "English", pages = "436--440", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", publisher = "IEEE", }
@inproceedings{b84ab7230c8f4100a1884b66ded14eee, title = "Variance Preserving Initialization for Training Deep Neuromorphic Photonic Networks with Sinusoidal Activations", abstract = "Photonic neuromorphic hardware can provide significant performance benefits for Deep Learning (DL) applications by accelerating and reducing the energy requirements of DL models. However, photonic neuromorphic architectures employ different activation elements than those traditionally used in DL, slowing down the convergence of the training process for such architectures. An initialization scheme that can be used to efficiently train deep photonic networks that employ quadratic sinusoidal activation functions is proposed in this paper. The proposed initialization scheme can overcome these limitations, leading to faster and more stable training of deep photonic neural networks. The ability of the proposed method to improve the convergence of the training process is experimentally demonstrated using two different DL architectures and two datasets.", keywords = "Neuromorphic Hardware, Photonic Neural Networks, Sinusoidal Activations", author = "Nikolaos Passalis and George Mourgias-Alexandris and Apostolos Tsakyridis and Nikos Pleros and Anastasios Tefas", note = "EXT={"}Tefas, Anastasios{"}", year = "2019", month = "5", day = "1", doi = "10.1109/ICASSP.2019.8682218", language = "English", publisher = "IEEE", pages = "1483--1487", booktitle = "2019 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2019 - Proceedings", }
@inproceedings{c0d995876a4943ebb231edf8b9f481dd, title = "The FitOptiVis ECSEL Project: Highly Efficient Distributed Embedded Image/Video Processing in Cyber-Physical Systems Invited Pape", abstract = "Cyber-Physical Systems (CPS) are systems that are in feedback with their environment, possibly with humans in the loop. They are often distributed with sensors and actuators, smart, adaptive and predictive and react in real-time. Image- A nd video-processing pipelines are a prime source for environmental information improving the possibilities of active, relevant feedback. In such a context, FitOptiVis aims to provide end-to-end multi-objective optimization for imaging and video pipelines of CPS, with emphasis on energy and performance, leveraging on a reference architecture, supported by low-power, high-performance, smart devices, and by methods and tools for combined design-time and run-time multi-objective optimization within system and environment constraints.", keywords = "Distributed systems, Energy and performance optimization, Heterogeneous system, Image-video processing", author = "Zaid Al-Ars and Twan Basten and Adde Beer and Marc Geilen and Dip Goswami and Pekka J{\"a}{\"a}skel{\"a}inen and Ji{\o}{\'i} Kadlec and Alejandro, {Marcos Martinezde} and Francesca Palumbo and Geran Peeren and Luigi Pomante and Linden, {Frank Vander} and Juka Saarinen and Tero S{\"a}ntti and Carlo Sau and Zedda, {Maria Katiuscia}", year = "2019", month = "4", day = "30", doi = "10.1145/3310273.3323437", language = "English", pages = "333--338", booktitle = "ACM International Conference on Computing Frontiers 2019, CF 2019 - Proceedings", publisher = "ACM", }
@inproceedings{ff82bc272ad84a7192d8c6e3b0426c25, title = "How do academics experience use of recorded audio feedback in higher education? A thematic analysis", abstract = "Our Work in Progress Paper in Research to Practice Category focuses on use of recorded audio feedback (RAF) in higher education. RAF is one method for providing feedback that is becoming increasingly popular, especially in e-education. According to previous studies, most learners have an overall positive attitude towards RAF. However, many of the studies have been carried out from learners' point of view. To complement RAF research, we study how academics experience use of RAF as a feedback method. We adopted a qualitative content analysis approach, applying thematic network analysis to the data received from four case academics. This approach proposes graphical networks as an aid for analyzing and synthesizing qualitative data into basic, organizing and global themes. The thematic network analysis produced two global, nine organizational and 45 basic themes. The two global themes were named 'Dialogue diversification' and 'Load reduction'. Based on our analysis, academics can, by using RAF, provide learners more relaxed and dialogic feedback and reduce their own workload both mentally and physically.", keywords = "Academics, Distance learning, E-education, Higher education, RAF, Recorded audio feedback, Thematic network analysis, Work in Progress", author = "Anneli Heimbirger and Ville Isomottonen and Paavo Nieminen and Harri Keto", note = "jufoid=70484", year = "2019", month = "3", day = "4", doi = "10.1109/FIE.2018.8658635", language = "English", series = "Proceedings - Frontiers in Education Conference", publisher = "IEEE", booktitle = "Frontiers in Education", }
@article{ad5a6291a64240a6b3856f275154bfd7, title = "Challenges of Multi-Factor Authentication for Securing Advanced IoT Applications", abstract = "The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for A-IoT. This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the smart city paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to said equipment is potentially dangerous. Hence, highly secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with the devices they own on a daily basis, thus demanding authentication procedures to be seamless and user-friendly, mindful of contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging smart city environments. We finally outline the open questions to shape future research efforts in this emerging field.", author = "Aleksandr Ometov and Vitaly Petrov and Sergey Bezzateev and Sergey Andreev and Yevgeni Koucheryavy and Mario Gerla", year = "2019", month = "3", day = "1", doi = "10.1109/MNET.2019.1800240", language = "English", volume = "33", pages = "82--88", journal = "IEEE Network", issn = "0890-8044", publisher = "Institute of Electrical and Electronics Engineers", number = "2", }
@article{5ffbd396d2074f948876597559b8f419, title = "Analysis of an efficient parallel implementation of active-set Newton algorithm", abstract = "This paper presents an analysis of an efficient parallel implementation of the active-set Newton algorithm (ASNA), which is used to estimate the nonnegative weights of linear combinations of the atoms in a large-scale dictionary to approximate an observation vector by minimizing the Kullback–Leibler divergence between the observation vector and the approximation. The performance of ASNA has been proved in previous works against other state-of-the-art methods. The implementations analysed in this paper have been developed in C, using parallel programming techniques to obtain a better performance in multicore architectures than the original MATLAB implementation. Also a hardware analysis is performed to check the influence of CPU frequency and number of CPU cores in the different implementations proposed. The new implementations allow ASNA algorithm to tackle real-time problems due to the execution time reduction obtained.", keywords = "Convex optimization, Multicore, Newton algorithm, Parallel computing, Sparse representation", author = "{San Juan Sebasti{\'a}n}, Pablo and Tuomas Virtanen and Garcia-Molla, {Victor M.} and Vidal, {Antonio M.}", year = "2019", month = "3", doi = "10.1007/s11227-018-2423-5", language = "English", volume = "75", pages = "1298--1309", journal = "Journal of Supercomputing", issn = "0920-8542", publisher = "Springer Verlag", number = "3", }
@article{d32315f6142a416487b66a472c6a9c9f, title = "Convolutional low-resolution fine-grained classification", abstract = "Successful fine-grained image classification methods learn subtle details between visually similar (sub-)classes, but the problem becomes significantly more challenging if the details are missing due to low resolution. Encouraged by the recent success of Convolutional Neural Network (CNN) architectures in image classification, we propose a novel resolution-aware deep model which combines convolutional image super-resolution and convolutional fine-grained classification into a single model in an end-to-end manner. Extensive experiments on multiple benchmarks demonstrate that the proposed model consistently performs better than conventional convolutional networks on classifying fine-grained object classes in low-resolution images.", keywords = "Deep learning, Fine-grained image classification, Super resolution convoluational neural networks", author = "Dingding Cai and Ke Chen and Yanlin Qian and Joni-Kristian K{\"a}m{\"a}r{\"a}inen", year = "2019", month = "3", doi = "10.1016/j.patrec.2017.10.020", language = "English", volume = "119", pages = "166--171", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{01ed724b6a2647e6aafccbf6b52d20dc, title = "Challenges and recommended practices for software architecting in global software development", abstract = "Context: Global software development (GSD), although now a norm in the software industry, carries with it enormous challenges mostly regarding communication and coordination. Aforementioned challenges are highlighted when there is a need to transfer knowledge between sites, particularly when software artifacts assigned to different sites depend on each other. The design of the software architecture and associated task dependencies play a major role in reducing some of these challenges. Objective: The current literature does not provide a cohesive picture of how the distributed nature of software development is taken into account during the design phase: what to avoid, and what works in practice. The objective of this paper is to gain an understanding of software architecting in the context of GSD, in order to develop a framework of challenges and solutions that can be applied in both research and practice. Method: We conducted a systematic literature review (SLR) that synthesises (i) challenges which GSD imposes on software architecture design, and (ii) recommended practices to alleviate these challenges. Results: We produced a comprehensive set of guidelines for performing software architecture design in GSD based on 55 selected studies. Our framework comprises nine key challenges with 28 related concerns, and nine recommended practices, with 22 related concerns for software architecture design in GSD. These challenges and practices were mapped to a thematic conceptual model with the following concepts: Organization (Structure and Resources), Ways of Working (Architecture Knowledge Management, Change Management and Quality Management), Design Practices, Modularity and Task Allocation. Conclusion: The synthesis of findings resulted in a thematic conceptual model of the problem area, a mapping of the key challenges to practices, and a concern framework providing concrete questions to aid the design process in a distributed setting. This is a first step in creating more concrete architecture design practices and guidelines.", keywords = "Design practice, Global software development, Software architecture, Software design, Systematic literature review", author = "Outi Sievi-Korte and Sarah Beecham and Ita Richardson", year = "2019", month = "2", day = "1", doi = "10.1016/j.infsof.2018.10.008", language = "English", volume = "106", pages = "234--253", journal = "Information and Software Technology", issn = "0950-5849", publisher = "Elsevier", }
@inproceedings{725a3a40f7fa47078cb475616380f239, title = "Additional lossless compression of JPEG images based on BPG", abstract = "The task of additional lossless compression of JPEG images is considered. We propose to decode JPEG image and recompress it using lossy BPG (Better Portable Graphics) codec based on a subset of the HEVC open video compression standard. Then the decompressed and smoothed BPG image is used for calculation and quantization of DCT coefficients in 8x8 image blocks using quantization tables of the source JPEG image. A difference between obtained quantized DCT coefficients and quantized DCT coefficients of the source JPEG image (prediction error) is calculated. The difference is lossless compressed by a proposed context modeling and arithmetical coding. In this way the source JPEG image is replaced by two files: compressed BPG image and the compressed difference which needed for lossless restoration of the source JPEG image. It is shown that the proposed approach provides compression ratios comparable with state of the art PAQ8, WinZip and STUFFIT file archivers. At the same time BPG images may be used for fast preview of compressed JPEG images.", keywords = "Context modelling, Discrete cosine transform, JPEG, JPEG additional compression", author = "Mykola Ponomarenko and Oleksandr Miroshnichenko and Vladimir Lukin and Karen Egiazarian", year = "2019", month = "1", day = "13", doi = "10.2352/ISSN.2470-1173.2019.11.IPAS-263", language = "English", series = "IS and T International Symposium on Electronic Imaging Science and Technology", booktitle = "Image Processing: Algorithms and Systems XVII", }
@inproceedings{327cc760a9ea47d9a07667c8a3a13411, title = "Combined no-reference IQA metric and its performance analysis", abstract = "The problem of increasing efficiency of blind image quality assessment is considered. No-reference image quality metrics both independently and as components of complex image processing systems are employed in various application areas where images are the main carriers of information. Meanwhile, existing no-reference metrics have a significant drawback characterized by a low adequacy to image perception by human visual system (HVS). Many well-known no-reference metrics are analyzed in our paper for several image databases. A method of combining several no-reference metrics based on artificial neural networks is proposed based on multi-database verification approach. The effectiveness of the proposed approach is confirmed by extensive experiments.", keywords = "Combined metrics, Full-reference metrics, Image visual quality assessment, Robust metrics", author = "Oleg Ieremeiev and Vladimir Lukin and Nikolay Ponomarenko and Karen Egiazarian", year = "2019", month = "1", day = "13", doi = "10.2352/ISSN.2470-1173.2019.11.IPAS-260", language = "English", series = "IS and T International Symposium on Electronic Imaging Science and Technology", booktitle = "Image Processing: Algorithms and Systems XVII", }
@inproceedings{891edbdf40674f7b8039fe9311c80364, title = "Phase masks optimization for broadband diffractive imaging", abstract = "The task of optimization of phase masks for broadband diffractive imaging to minimize chromatic aberrations and to provide given value of Depth of Focus (DoF) is considered. Different schemes of multilevel phase mask (MPM) forming by combining pixels of two Fresnel lenses are analyzed. The Fresnel lenses are calculated for the same focal distance but for very different wavelengths. A possibility of adding to the optimized mask a cubic component is taking into account as well as usage of discrete phase masks with optimized number of levels. It is shown that the proposed approach in the combination with inverse imaging allows to significantly increase image quality for a focus distance in comparison to refractive lens-based optical systems. Moreover, it is shown that by changing of aforementioned parameters it is possible to increase or decrease DoF value depending from a given goal of optimization. It is demonstrated by numerical analysis that the proposed approach significantly increases robustness of designed MPM to Gaussian additive noise in MPM introduced due to fabrication errors.", keywords = "Diffractive optical elements, Inverse imaging, Lensless imaging, Multilevel phase mask design", author = "Mykola Ponomarenko and Vladimir Katkovnik and Karen Egiazarian", year = "2019", month = "1", day = "13", doi = "10.2352/ISSN.2470-1173.2019.11.IPAS-258", language = "English", series = "IS and T International Symposium on Electronic Imaging Science and Technology", booktitle = "Image Processing: Algorithms and Systems XVII", }
@inproceedings{3a32622658504d2e905646f2d6fd2267, title = "Thin form-factor super multiview head-up display system", abstract = "We propose a virtual-image head-up display (HUD) based on the super multiview (SMV) display technology. Implementation-wise, the HUD provides a compact solution, consisting of a thin form-factor SMV display and a combiner placed on the windshield of the vehicle. Since the utilized display is at most few centimeters thick, it does not need extra installation space that is usually required by most of the existing virtual image HUDs. We analyze the capabilities of the proposed system in terms of several HUD related quality factors such as resolution, eyebox width, and target image depth. Subsequently, we verify the analysis results through experiments carried out using our SMV-HUD demonstrator. We show that the proposed system is capable of visualizing images at the typical virtual image HUD depths of 2 − 3m, in a reasonably large eyebox, which is slightly over 30cm in our demonstrator. For an image at the target virtual image depth of 2.5m, the field of view of the developed system is 11◦x16◦ and the spatial resolution is around 240x60 pixels in vertical and horizontal directions, respectively. There is, however, plenty of room for improvement regarding the resolution, as we actually utilize an LCD at moderate resolution (216 ppi) and off-the-shelf lenticular sheet in our demonstrator.", author = "Ugur Akpinar and Erdem Sahin and Olli Suominen and Atanas Gotchev", note = "jufoid=84313", year = "2019", month = "1", day = "13", doi = "10.2352/ISSN.2470-1173.2019.3.SDA-631", language = "English", series = "IS&T International Symposium on Electronic Imaging", booktitle = "Stereoscopic Displays and Applications XXX", }
@article{a5ce2431e45541b782feb84976b6a806, title = "Towards detecting structural branching and cyclicity in graphs: A polynomial-based approach", abstract = "Structural properties of graphs and networks have been investigated across scientific disciplines ranging from mathematics to structural chemistry. Structural branching, cyclicity and, more generally, connectedness are well-known examples of such properties. In particular, various graph measures for detecting structural branching and cyclicity have been investigated. These measures are of limited applicability since their interpretation relies heavily on a certain definition of structural branching. In this paper we define a related measure, taking an approach to measurement similar to that of Lov{\'a}sz and Pelik{\'a}n (On the eigenvalues of trees, Periodica Mathematica Hungarica, Vol. 3 (1–2), 1973, 175–182). We define a complex valued polynomial which also has a unique positive root. Analytical and numerical results demonstrate that this measure can be interpreted as a structural branching and cyclicity measure for graphs. Our results generalize the work of Lov{\'a}sz and Pelik{\'a}n since the measure we introduce is not restricted to trees.", keywords = "Data science, Graphs, Networks, Quantitative graph theory, Structural branching", author = "Matthias Dehmer and Zengqiang Chen and Frank Emmert-Streib and Abbe Mowshowitz and Yongtang Shi and Shailesh Tripathi and Yusen Zhang", year = "2019", month = "1", day = "1", doi = "10.1016/j.ins.2018.08.043", language = "English", volume = "471", pages = "19--28", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@inproceedings{c0ac2edc48794b04b93c0d22495a8f94, title = "Business intelligence process model revisited", abstract = "Today many organizations have come to value knowledge as a production factor. Thus, there is a constant need for getting the information in and sorted. Business intelligence (BI) is a process for systematic acquiring, analyzing, and disseminating data and information from various sources to gain understanding about the business's environment. This is required for supporting decisions for achieving organization's business objectives. Literature has introduced models for planning and executing BI. However, as business environments and technologies evolve in a rapid pace, are the models still applicable? Not all recent issues are taken into consideration in the previous models. BI is considered to be integrated into business processes, so the similar evolution is expected to take place. There are two studies investigating BI instigating this study, but there are still questions to be answered. Literature on different models and findings of these studies were combined to form a vision to better match reality. Various issues like users' active involvement, real-time analysis and presentation, and social media resources were brought up. Practitioners can use the approach to assess their current state of BI activities or planning the organization of BI program.", keywords = "Business Intelligence, Business Intelligence Process Model, Decision-Making, Organizational Development", author = "Pasi Hellsten and Jussi Myll{\"a}rniemi", year = "2019", language = "English", series = "IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management", publisher = "SCITEPRESS", pages = "341--348", editor = "Jorge Bernardino and Ana Salgado and Joaquim Filipe", booktitle = "IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management", }
@inproceedings{8e8f9e7feff94688b23e6b061d66201e, title = "Challenges in developing data-based value creation", abstract = "Understanding data-based value creation helps organizations to enhance its decision-making and to renew their business operations. However, organizations aiming to use modern data analytics face several severe challenges that are not usually so evident or visible beforehand. In this paper we study a Finnish manufacturing company's data empowerment and information and knowledge management practices in order to identify the potential challenges related to modern data-based value creation within industrial context. The empirical data is consisted of group discussions, relevant data sets acquired from the case company's information systems, and lastly, 12 thematic interviews of the key actors in the company in relation to service development. The study provides valuable insights for managing service development and decision-making and creates understanding on data-based value creation. Achieved understanding provides meaningful knowledge for organizations utilizing or having plans to utilize, for example, data analytic methods in their businesses.", keywords = "Case Study, Data-based Value Creation, Information Management Process, Knowledge Management", author = "Jussi Myll{\"a}rniemi and Nina Helander and Samuli Pekkola", year = "2019", language = "English", series = "IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management", publisher = "SCITEPRESS", pages = "370--376", editor = "Jorge Bernardino and Ana Salgado and Joaquim Filipe", booktitle = "IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management", }
@inproceedings{b4724f9abcb540ba9609ba03d8622ef4, title = "Co-creating digital services for citizens: Activity theory analysis", abstract = "Smart city development relies heavily on creation of digital services that are available for the citizens and for the city authorities. At best, these services are co-created by the authorities, citizens and the digital solution supplier companies. Digital service co-creation is, however, a complex process and includes several contradictions due to presence of several stakeholders. In this paper, we present a case study of smart city initiated digital service co-creation process through the analytical lenses of activity theory.", keywords = "Activity Theory, Co-creation, Digital Service, Empirical Study", author = "Jari Jussila and Joni Kukkam{\"a}ki and Nina Helander", note = "EXT={"}Jussila, Jari{"}", year = "2019", doi = "10.5220/0008349002850290", language = "English", series = "IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management", publisher = "SCITEPRESS", pages = "285--290", editor = "Jorge Bernardino and Ana Salgado and Joaquim Filipe", booktitle = "IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management", }
@article{8eeb22fc25584feea54e02aba5a70d9b, title = "Compatible natural gradient policy search", abstract = "Trust-region methods have yielded state-of-the-art results in policy search. A common approach is to use KL-divergence to bound the region of trust resulting in a natural gradient policy update. We show that the natural gradient and trust region optimization are equivalent if we use the natural parameterization of a standard exponential policy distribution in combination with compatible value function approximation. Moreover, we show that standard natural gradient updates may reduce the entropy of the policy according to a wrong schedule leading to premature convergence. To control entropy reduction we introduce a new policy search method called compatible policy search (COPOS) which bounds entropy loss. The experimental results show that COPOS yields state-of-the-art results in challenging continuous control tasks and in discrete partially observable tasks.", keywords = "Policy search, Reinforcement learning", author = "Joni Pajarinen and Thai, {Hong Linh} and Riad Akrour and Jan Peters and Gerhard Neumann", year = "2019", doi = "10.1007/s10994-019-05807-0", language = "English", journal = "Machine Learning", issn = "0885-6125", publisher = "Springer Verlag", }
@article{064b72fcb69a479788aaabd4170983da, title = "Continuum approach to high-cycle fatigue. The finite life-time case with stochastic stress history", abstract = "In this paper, we consider continuum approach for high-cycle fatigue in the case where life-time is finite. The method is based on differential equations and all basic concepts are explained. A stress history is assumed to be a stochastic process and this leads us to the theory of stochastic differential equations. The life-time is a quantity, which tells us when the breakdown of the material happens. In this method, it is naturally a random variable. The basic assumption is, that the distribution of the life-time is log-normal or Weibull. We give a numerical basic example to demonstrate the method.", keywords = "Evolution equation, High-cycle fatigue, Life-time", author = "H. Orelma", year = "2019", doi = "10.14498/vsgtu1705", language = "English", volume = "23", pages = "452--463", journal = "Vestnik Samarskogo Gosudarstvennogo Tekhnicheskogo Universiteta, Seriya Fiziko-Matematicheskie Nauki", issn = "1991-8615", number = "3", }
@inproceedings{211fdf799c3143b8a5253bfc35645afa, title = "Farm detection based on deep convolutional neural nets and semi-supervised green texture detection using VIS-NIR satellite image", abstract = "Farm detection using low resolution satellite images is an important topic in digital agriculture. However, it has not received enough attention compared to high-resolution images. Although high resolution images are more efficient for detection of land cover components, the analysis of low-resolution images are yet important due to the low-resolution repositories of the past satellite images used for timeseries analysis, free availability and economic concerns. The current paper addresses the problem of farm detection using low resolution satellite images. In digital agriculture, farm detection has significant role for key applications such as crop yield monitoring. Two main categories of object detection strategies are studied and compared in this paper; First, a two-step semi-supervised methodology is developed using traditional manual feature extraction and modelling techniques; the developed methodology uses the Normalized Difference Moisture Index (NDMI), Grey Level Co-occurrence Matrix (GLCM), 2-D Discrete Cosine Transform (DCT) and morphological features and Support Vector Machine (SVM) for classifier modelling. In the second strategy, high-level features learnt from the massive filter banks of deep Convolutional Neural Networks (CNNs) are utilised. Transfer learning strategies are employed for pretrained Visual Geometry Group Network (VGG-16) networks. Results show the superiority of the high-level features for classification of farm regions.", keywords = "Classification, Convolutional Neural Nets (CNNs), Digital Agriculture, Satellite Image, Supervised Feature Extraction", author = "Sara Sharifzadeh and Jagati Tata and Bo Tan", year = "2019", doi = "10.5220/0007954901000108", language = "English", pages = "100--108", editor = "Slimane Hammoudi and Christoph Quix and Jorge Bernardino", booktitle = "DATA 2019 - Proceedings of the 8th International Conference on Data Science, Technology and Applications", publisher = "SCITEPRESS", }
@article{f521e1b1deec4d6f9ca2d9fcf7337a3d, title = "Institutional Perspectives on the Process of Enterprise Architecture Adoption", abstract = "Organizations often adopt enterprise architecture (EA) when planning how best to develop their information technology (IT) or businesses, for strategic management, or generally for managing change initiatives. This variety of different uses affects many stakeholders within and between organizations. Because stakeholders have dissimilar backgrounds, positions, assumptions, and activities, they respond differently to changes and the potential problems that emerge from those changes. This situation creates contradictions and conflicts between stakeholders that may further influence project activities and ultimately determine how EA is adopted. In this paper, we examine how institutional pressures influence EA adoption. Based on a qualitative case study of two cases, we show how regulative, normative, and cognitive pressures influence stakeholders’ activities and behaviors during the process of EA adoption. Our contribution thus lies in identifying roles of institutional pressures in different phases during the process of EA adoption and how it changes overtime. The results provide insights into EA adoption and the process of institutionalization, which help to explain emergent challenges in EA adoption.", keywords = "EA adoption, Enterprise architecture, Institutional theory, Institutionalization process", author = "Duong Dang and Samuli Pekkola", note = "EXT={"}Dang, Duong{"}", year = "2019", doi = "10.1007/s10796-019-09944-8", language = "English", journal = "Information Systems Frontiers", issn = "1387-3326", publisher = "Springer Verlag", }
@inproceedings{05ff6e54d6834a979c3d0fbc566aa3de, title = "Log analysis of 360-degree video users via MQTT", abstract = "Analyzing 360-degree video users is beneficial for 360-degree video application development. The analysis can be done with logged user data. In this paper, we argue that MQTT is a conventional technology for distributed logging of mobile 360-degree video users. MQTT not only saves resources also allows communication from the logging server to mobile clients in various networking conditions relatively easy. We constructed a proof of concept to show the feasibility of the approach. As log analysis examples, the proof of concept visualizes results of the most popular region of interest analysis and k-means clustering. The used research method is design science.", keywords = "360-degree video, Component, Log Analysis, MQTT", author = "Antti Luoto", year = "2019", doi = "10.1145/3318236.3318248", language = "English", pages = "130--137", booktitle = "ICGDA 2019", publisher = "ACM", }
@article{232ee629d8e44f56ac84c76d47a2a12c, title = "PyGOP: A Python library for Generalized Operational Perceptron algorithms", abstract = "PyGOP provides a reference implementation of existing algorithms using Generalized Operational Perceptron (GOP), a recently proposed artificial neuron model. The implementation adopts a user-friendly interface while allowing a high level of customization including user-defined operators, custom loss function, custom metric functions that requires full batch evaluation such as Precision, Recall or F1. Besides, PyGOP supports different computation environments (CPU/GPU) on both single machine and cluster using SLURM job scheduler. In addition, since training GOP-based algorithms might take days, PyGOP automatically saves checkpoints during computation and allows resuming to the last checkpoint in case the script got interfered in the middle during the progression.", keywords = "Generalized Operational Perceptron (GOP), Heterogeneous Multilayer Generalized Operational Perceptron (HeMLGOP), Progressive Operational Perceptron (POP), Progressive Operational Perceptron with Memory (POPmem)", author = "Tran, {Dat Thanh} and Serkan Kiranyaz and Moncef Gabbouj and Alexandros Iosifidis", note = "EXT={"}Kiranyaz, Serkan{"} EXT={"}Iosifidis, Alexandros{"}", year = "2019", doi = "10.1016/j.knosys.2019.06.009", language = "English", journal = "Knowledge-Based Systems", issn = "0950-7051", publisher = "Elsevier", }
@inproceedings{5bcd34e859ce446aa2e8c0255959d575, title = "Revisiting continuous deployment maturity: A two-year perspective", abstract = "Background: Achieving a steady stream of small releases and employing practices such as continuous deployment requires maturity in company processes. Maturity models provide one approach for companies to pinpoint areas of improvement by providing a position and hints to reflect on. Incorporating maturity models with agile software development and continuous deployment has its challenges, though. Aims: The focus of the study is in understanding the evolution of software processes towards continuous deployment in an industry organization over time when a maturity model is used as a yardstick in evaluation. Method: An embedded case study by design, the study utilizes and replicates a survey on the state of software projects in a large Finnish software company, Solita. The survey was initially conducted in 2015 with responses from 35 projects and now replicated in 2017 with responses from 43 projects. Both quantitative and qualitative approaches for survey responses are used in the analysis. Results: Maturity of software processes in the case company show improvement in deployment and in monitoring, albeit short of statistical significance. Technological advances in the application of cloud computing have likely spurred development in these areas. Capability in processes related to test automation and quality has not changed much in two years. Conclusions: Maintaining maturity in software processes requires constant attention as impressions on process quality can gradually diminish. Projects which are built on a compatible technology stack have a greater chance in achieving continuous deployment and thus being more mature. Customer preferences also make a difference in the ability to reach certain maturity levels.", author = "Simo M{\"a}kinen and Mikko Puonti and Timo Lehtonen and Tommi Mikkonen and Terhi Kilamo and Tomi M{\"a}nnist{\"o}", note = "EXT={"}Mikkonen, Tommi{"} EXT={"}Puonti, Mikko{"}", year = "2019", doi = "10.1145/3297280.3297458", language = "English", isbn = "9781450359337", pages = "1810--1817", booktitle = "Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing", publisher = "ACM", }
@inproceedings{b12c52d003df45ec9fbfd809287d6c30, title = "The Lord of the shares: Combining attribute-based encryption and searchable encryption for flexible data sharing", abstract = "Secure cloud storage is considered one of the most important issues that both businesses and end-users are considering before moving their private data to the cloud. Lately, we have seen some interesting approaches that are based either on the promising concept of Symmetric Searchable Encryption (SSE) or on the well-studied field of Attribute-Based Encryption (ABE). In the first case, researchers are trying to design protocols where users' data will be protected from both internal and external attacks without paying the necessary attention to the problem of user revocation. On the other hand, in the second case existing approaches address the problem of revocation. However, the overall efficiency of these systems is compromised since the proposed protocols are solely based on ABE schemes and the size of the produced ciphertexts and the time required to decrypt grows with the complexity of the access formula. In this paper, we propose a protocol that combines both SSE and ABE in a way that the main advantages of each scheme are used. The proposed protocol allows users to directly search over encrypted data by using an SSE scheme while the corresponding symmetric key that is needed for the decryption is protected via a Ciphertext-Policy Attribute-Based Encryption scheme.", keywords = "Access Control, Attribute-Based Encryption, Cloud Security, Hybrid Encryption, Policies, Storage Protection, Symmetric Searchable Encryption", author = "Antonis Michalas", year = "2019", doi = "10.1145/3297280.3297297", language = "English", isbn = "9781450359337", pages = "146--155", booktitle = "Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing", publisher = "ACM", }
@article{041f5ae186234fe58f0426de6fa74cc9, title = "Zeffiro User Interface for Electromagnetic Brain Imaging: a GPU Accelerated FEM Tool for Forward and Inverse Computations in Matlab", abstract = "This article introduces the Zeffiro interface (ZI) version 2.2 for brain imaging. ZI aims to provide a simple, accessible and multimodal open source platform for finite element method (FEM) based and graphics processing unit (GPU) accelerated forward and inverse computations in the Matlab environment. It allows one to (1) generate a given multi-compartment head model, (2) to evaluate a lead field matrix as well as (3) to invert and analyze a given set of measurements. GPU acceleration is applied in each of the processing stages (1)–(3). In its current configuration, ZI includes forward solvers for electro-/magnetoencephalography (EEG) and linearized electrical impedance tomography (EIT) as well as a set of inverse solvers based on the hierarchical Bayesian model (HBM). We report the results of EEG and EIT inversion tests performed with real and synthetic data, respectively, and demonstrate numerically how the inversion parameters affect the EEG inversion outcome in HBM. The GPU acceleration was found to be essential in the generation of the FE mesh and the LF matrix in order to achieve a reasonable computing time. The code package can be extended in the future based on the directions given in this article.", keywords = "Electrical Impedance Tomography (EIT), Electro-/Magnetoencephalography (EEG/MEG), Finite Element Method (FEM), Hierarchical Bayesian Model (HBM), Matlab Interface", author = "Q. He and A. Rezaei and S. Pursiainen", year = "2019", doi = "10.1007/s12021-019-09436-9", language = "English", journal = "Neuroinformatics", issn = "1539-2791", publisher = "HUMANA PRESS INC", }
@inproceedings{c4f8e3590f6d4ae9804b3567d9d51e8f, title = "On the Secrecy Capacity of Fisher-Snedecor F Fading Channels", abstract = "The performance of physical-layer security of the classic Wyner's wiretap model over Fisher-Snedecor composite fading channels is considered in this work. Specifically, F the main channel (i.e., between the source and the legitimate destination) and the eavesdropper's channel (i.e., between the source and the illegitimate destination) are assumed to experience independent quasi-static Fisher-Snedecor fading conditions, which have been shown to be encountered in realistic wireless transmission scenarios in conventional and emerging communication systems. In this context, exact closed-form expressions for the average secrecy capacity (ASC) and the probability of non-zero secrecy capacity (PNSC) are derived. Additionally, an asymptotic analytical expression for the ASC is presented. The impact of shadowing and multipath fading on the secrecy performance is investigated. Our results show that increasing the fading parameter of the main channel and/or the shadowing parameter of the eavesdropper's channel improves the secrecy performance. The analytical results are compared with Monte-Carlo simulations to validate the analysis.", author = "Badarneh, {Osamah S.} and Sofotasios, {Paschalis C.} and Sami Muhaidat and Cotton, {Simon L.} and Khaled Rabie and Naofal Al-Dhahir", year = "2018", month = "12", day = "26", doi = "10.1109/WiMOB.2018.8589137", language = "English", pages = "102--107", booktitle = "2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2018", publisher = "IEEE", }
@inproceedings{0eb25a7ba9a84efc999dd53be936cb59, title = "The N∗Fisher-Snedecor F Cascaded Fading Model", abstract = "The Fisher-Snedecor F distribution was recently proposed as an accurate and tractable composite fading model in the context of device-to-device communications. The present work derives the product of the Fisher-Snedecor F composite fading model, which is useful in characterizing fading effects in numerous realistic communication scenarios. To this end, novel analytic expressions are first derived for the probability density function, the cumulative distribution function and the moment of the product of N statistically independent, but not necessarily identically distributed, Fisher-Snedecor F random variables. Capitalizing on these expressions, we derive tractable closed-form expressions for channel quality estimation of the proposed model as well as the corresponding outage probability and average bit error probability for binary modulations. The offered results are corroborated by extensive Monte-Carlo simulation results, which verify the validity of the derived expressions. It is shown that the number of cascaded channels affects considerably the corresponding performance, as a variation of over an order of magnitude is observed across all signal-to-noise ratio regimes.", author = "Badarneh, {Osamah S.} and Sami Muhaidat and Sofotasios, {Paschalis C.} and Cotton, {Simon L.} and Khaled Rabie and {Da Costa}, {Daniel B.}", year = "2018", month = "12", day = "26", doi = "10.1109/WiMOB.2018.8589124", language = "English", booktitle = "2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2018", publisher = "IEEE", }
@article{2ab5430f3f0a4fdcb18e115d7a16575b, title = "Power mitigation of a heterogeneous multicore architecture on FPGA/ASIC by DFS/DVFS techniques", abstract = "This article presents an integrated self-aware computing model in a Heterogeneous Multicore Architecture (HMA) to mitigate the power dissipation of an Orthogonal Frequency-Division Multiplexing (OFDM) receiver. The proposed platform consists of template-based Coarse-Grained Reconfigurable Array (CGRA) devices connected through a Network-on-Chip (NoC) around a few Reduced Instruction-Set Computing (RISC) cores. The self-aware computing model exploits Feedback Control System (FCS) which constantly monitors the execution-time of each core and dynamically scales the operating frequency of each node of the NoC depending on the worst execution-time. Therefore, the performance of the overall system is equalized towards a desired level besides mitigating the power dissipation. Measurement results obtained from Field-Programmable Gate Array (FPGA) synthesis show up to 20.2{\%} dynamic power dissipation and 16.8{\%} total power dissipation savings. Since FCS technique can be employed for scaling the frequency and the voltage and on the other hand, voltage supply cannot be scaled on the FPGA-based prototyped platform, the implementation is also estimated in 28nm Ultra-Thin Body and Buried oxide (UTBB) Fully-Depleted Silicon-On-Insulator (FD-SOI) Application-Specific Integrated Circuit (ASIC) technology to scale voltage in addition to frequency and get more benefits in terms of dynamic power dissipation reduction. Subsequent to synthesizing the whole platform on ASIC and scaling the voltage and frequency simultaneously as a Dynamic Voltage and Frequency Scaling (DVFS) method, significant dynamic power dissipation savings by 5.97X against Dynamic Frequency Scaling (DFS) method were obtained.", keywords = "Accelerator, ASIC, CGRA, Channel estimation, DVFS, FCS, FFT, FPGA, Frequency offset estimation, Heterogeneous, Multicore, Network-on-Chip, OFDM, Power mitigation, Receiver, Reconfigurable, Time synchronization", author = "Sajjad Nouri and Davide Rossi and Jari Nurmi", year = "2018", month = "11", day = "1", doi = "10.1016/j.micpro.2018.09.010", language = "English", volume = "63", pages = "259--268", journal = "Microprocessors and Microsystems", issn = "0141-9331", publisher = "Elsevier", }
@inproceedings{ec7a82ff3f7d4febb0d0dbc939e24993, title = "End-to-End Polyphonic Sound Event Detection Using Convolutional Recurrent Neural Networks with Learned Time-Frequency Representation Input", abstract = "Sound event detection systems typically consist of two stages: Extracting hand-crafted features from the raw audio waveform, and learning a mapping between these features and the target sound events using a classifier. Recently, the focus of sound event detection research has been mostly shifted to the latter stage using standard features such as mel spectrogram as the input for classifiers such as deep neural networks. In this work, we utilize end-to-end approach and propose to combine these two stages in a single deep neural network classifier. The feature extraction over the raw waveform is conducted by a feedforward layer block, whose parameters are initialized to extract the time-frequency representations. The feature extraction parameters are updated during training, resulting with a representation that is optimized for the specific task. This feature extraction block is followed by (and jointly trained with) a convolutional recurrent network, which has recently given state-of-the-art results in many sound recognition tasks. The proposed system does not outperform a convolutional recurrent network with fixed hand-crafted features. The final magnitude spectrum characteristics of the feature extraction block parameters indicate that the most relevant information for the given task is contained in 0 - 3 kHz frequency range, and this is also supported by the empirical results on the SED performance.", keywords = "convolutional recurrent neural networks, end-to-end, feature learning, neural networks", author = "Emre Cakir and Tuomas Virtanen", note = "jufoid=58177", year = "2018", month = "10", day = "10", doi = "10.1109/IJCNN.2018.8489470", language = "English", publisher = "IEEE", booktitle = "2018 International Joint Conference on Neural Networks, IJCNN 2018 - Proceedings", }
@inproceedings{982181a480e746aeb815b97c9451b0d7, title = "Guidelines for development and evaluation of usage data analytics tools for human-machine interactions with industrial manufacturing systems", abstract = "We present the lessons learned during the development and evaluation process for UX-sensors, a visual data analytics tool for inspecting logged usage data from flexible manufacturing systems (FMS). Based on the experiences during a collaborative development process with practitioners from one FMS supplier company, we propose guidelines to support other developers of visual data analytics tools for usage data logging in context of complex industrial systems. For instance, involving stakeholders with different roles can help to identify user requirements and generate valuable development ideas. Tool developers should confirm early access to real usage data from customers' systems and familiarize themselves with the log data structure. We argue that combining expert evaluations with field study methods can provide a more diverse set of usability issues to address. For future research, we encourage studies on insights emerging from usage data analytics and their impact on the viewpoints of the supplier and customer.", author = "Jari Varsaluoma and Heli V{\"a}{\"a}t{\"a}j{\"a} and Tomi Heimonen and Katariina Tiitinen and Jaakko Hakulinen and Markku Turunen and Harri Nieminen", note = "EXT={"}Nieminen, Harri{"}", year = "2018", month = "10", day = "10", doi = "10.1145/3275116.3275138", language = "English", pages = "172--181", booktitle = "Mindtrek 2018 - Proceedings of the 22nd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{64bcfc47ccd149b292844cc921c29bed, title = "Implications of audio and narration in the user experience design of virtual reality", abstract = "Virtual reality (VR) is quickly gaining momentum as an immersive medium; however, there is much to learn about the design elements needed to create a positive experience. In this paper, we present the second wave of user testing of a journalistic and cultural VR experience that tells the story of a well-known artist through his art. The storytelling elements narration and ambient music were added to the initial prototype and tested in the field with 32 participants. Our results showed that the improvements produced a mostly positive user experience and shed light on what could be further improved in the case of our prototype, the field of immersive journalism, and VR used in the cultural context.", keywords = "Cultural VR, Immersive Journalism, Museum, Storytelling", author = "Chelsea Kelling and Jussi Karhu and Otto Kauhanen and Markku Turunen and Heli V{\"a}{\"a}t{\"a}j{\"a} and Vesa Lindqvist", note = "INT=tie,{"}Kauhanen, Otto{"}", year = "2018", month = "10", day = "10", doi = "10.1145/3275116.3275153", language = "English", pages = "258--261", booktitle = "Mindtrek 2018 - Proceedings of the 22nd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{e47c1a4e24a24d6a9c01c9a729dd5d1d, title = "Multichannel Sound Event Detection Using 3D Convolutional Neural Networks for Learning Inter-channel Features", abstract = "In this paper, we propose a stacked convolutional and recurrent neural network (CRNN) with a 3D convolutional neural network (CNN) in the first layer for the multichannel sound event detection (SED) task. The 3D CNN enables the network to simultaneously learn the inter-and intra-channel features from the input multichannel audio. In order to evaluate the proposed method, multichannel audio datasets with different number of overlapping sound sources are synthesized. Each of this dataset has a four-channel first-order Ambisonic, binaural, and single-channel versions, on which the performance of SED using the proposed method are compared to study the potential of SED using multichannel audio. A similar study is also done with the binaural and single-channel versions of the real-life recording TUT-SED 2017 development dataset. The proposed method learns to recognize overlapping sound events from multichannel features faster and performs better SED with a fewer number of training epochs. The results show that on using multichannel Ambisonic audio in place of single-channel audio we improve the overall F-score by 7.5{\%}, overall error rate by 10{\%} and recognize 15.6{\%} more sound events in time frames with four overlapping sound sources.", author = "Sharath Adavanne and Archontis Politis and Tuomas Virtanen", note = "jufoid=58177", year = "2018", month = "10", day = "10", doi = "10.1109/IJCNN.2018.8489542", language = "English", publisher = "IEEE", booktitle = "2018 International Joint Conference on Neural Networks, IJCNN 2018 - Proceedings", }
@inproceedings{fcd1b32304314fd69212b6da4296842a, title = "Robotic process automation - Creating value by digitalizing work in the private healthcare?", abstract = "Organizations are applying digitalization to the constantly increasing amounts of different organizational processes [2]. The healthcare sector is also changing and actively seeking better ways to enhance performance, especially in the private healthcare sector [7]. Automation of workflow processes, e.g., Robotic Process Automation (RPA), in organizations has been emerging as a solution to this demand [3, 4]. To meet this clear demand, automation of workflow processes in organizations has been a rising trend during the past few years [3]. We analyze the value creating functions of the RPA potential in the private healthcare industry sector, using modified Walter et al.’s function-oriented value analysis as our theoretical lens for identifying the potential of RPA.", keywords = "Digitalization of knowledge work, Healthcare, Robotic Process Automation, Value creation", author = "M. Ratia and J. Myll{\"a}rniemi and N. Helander", year = "2018", month = "10", day = "10", doi = "10.1145/3275116.3275129", language = "English", pages = "222--227", booktitle = "Mindtrek 2018 - Proceedings of the 22nd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{4149d906400c47e49b708bef5e799d21, title = "Systematic literature review on user logging in virtual reality", abstract = "In this systematic literature review, we study the role of user logging in virtual reality research. By categorizing literature according to data collection methods and identifying reasons for data collection, we aim to find out how popular user logging is in virtual reality research. In addition, we identify publications with detailed descriptions about logging solutions. Our results suggest that virtual reality logging solutions are relatively seldom described in detail despite that many studies gather data by body tracking. Most of the papers gather data to witness something about a novel functionality or to compare different technologies without discussing logging details. The results can be used for scoping future virtual reality research.", keywords = "Systematic Literature Review, User Logging", author = "Antti Luoto", year = "2018", month = "10", day = "10", doi = "10.1145/3275116.3275123", language = "English", pages = "110--117", booktitle = "Mindtrek 2018 - Proceedings of the 22nd International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{d76751bb92954929901f0d4f507c10ab, title = "The Finnish you – An interactive storytelling application for an airport environment", abstract = "Traveling should be full of excitement and new experiences. However, a chaotic airport environment and constant waiting often halt these pleasurable feelings. Although passengers can spend their time shopping, they are unlikely to connect personally to the products. Furthermore, airport services seldom highlight the local culture that passengers miss by being confined to the airport. To address these shortcomings, we present a mobile web-application, called “The Finnish You”. Utilizing the elements of interactive storytelling and gamification, the application guides users through shops and brands in the airport while teaching about the local culture in a personalized way. The application was tested in a user study with nine participants in a controlled office environment and was seen as a satisfactory way to spend time waiting in the airport. Our findings show how a personalized storytelling approach may convert ordinary shopping activity into a culture-learning adventure. We further suggest implications for the design of storytelling applications regarding the airport context of use.", keywords = "Airport Environment, Digital Storytelling, Gamification, Mobile Web-Application, User Experience", author = "Alisa Burova and Chelsea Kelling and Jaakko Hakulinen and Pekka Kallioniemi and Tuuli Keskinen and Markku Turunen and Heli V{\"a}{\"a}t{\"a}j{\"a}", year = "2018", month = "10", day = "10", doi = "10.1145/3275116.3275142", language = "English", pages = "182--191", booktitle = "Mindtrek 2018 - Proceedings of the 22nd International Academic Mindtrek Conference", publisher = "ACM", }
@article{a40db4c6a2e04a008297862c4bb6421e, title = "Graph measures with high discrimination power revisited: A random polynomial approach", abstract = "Finding graph measures with high discrimination power has been triggered by searching for so-called complete graph invariants. In a series of papers, we have already investigated highly discriminating measures to distinguish graphs (networks) based on their topology. In this paper, we propose an approach where the graph measures are based on the roots of random graph polynomials. The polynomial coefficients have been defined by utilizing information functionals which capture structural information of the underlying networks. Our numerical results obtained by employing exhaustively generated graphs reveal that the new approach outperforms earlier results in the literature.", keywords = "Data science, Graphs, Networks, Quantitative graph theory, Statistics", author = "Matthias Dehmer and Zengqiang Chen and Frank Emmert-Streib and Yongtang Shi and Shailesh Tripathi", note = "EXT={"}Tripathi, Shailesh{"}", year = "2018", month = "10", day = "1", doi = "10.1016/j.ins.2018.07.072", language = "English", volume = "467", pages = "407--414", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@article{98f7a5a038524c2e9fbffc9b1344c32c, title = "Reproducible Evaluation of System Efficiency with a Model of Architecture: From Theory to Practice", abstract = "Current trends in high performance and embedded computing include design of increasingly complex hardware architectures with high parallelism, heterogeneous processing elements and non-uniform communication resources. In order to take hardware and software design decisions, early evaluations of the system non-functional properties are needed. These evaluations of system efficiency require Electronic System-Level (ESL) information on both the algorithms and the architecture. Contrary to algorithm models for which a major body of work has been conducted on defining formal Models of Computation (MoCs), architecture models from the literature are mostly empirical models from which reproducible experimentation requires the accompanying software. In this paper, a precise definition of a Model of Architecture (MoA) is proposed that focuses on reproducibility and abstraction and removes the overlap previously existing between the notions of MoA and MoC. A first MoA, called the Linear System-Level Architecture Model (LSLA), is presented. To demonstrate the generic nature of the proposed new architecture modeling concepts, we show that the LSLA Model can be integrated flexibly with different MoCs. LSLA is then used to model the energy consumption of a State-of-the-Art Multiprocessor System-on-Chip (MPSoC) when running an application described using the Synchronous Dataflow (SDF) MoC. A method to automatically learn LSLA model parameters from platform measurements is introduced. Despite the high complexity of the underlying hardware and software, a simple LSLA model is demonstrated to estimate the energy consumption of the MPSoC with a fidelity of 86{\%}.", keywords = "Algorithm design and analysis, architecture, Complexity theory, Computational modeling, Computer architecture, design space exploration, Energy consumption, Hardware, hardware/software co-design, modeling, multiprocessor SoC, performance optimization, Ports (Computers), power modeling and estimation., system on chip", author = "Maxime Pelcat and Alexandre Mercat and Karol Desnos and Luca Maggiani and Yanzhou Liu and Julien Heulot and Nezan, {Jean Francois} and Wassim Hamidouche and Daniel Menard and Bhattacharyya, {Shuvra S.}", year = "2018", month = "10", doi = "10.1109/TCAD.2017.2774822", language = "English", volume = "37", pages = "2050--2063", journal = "IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems", issn = "0278-0070", publisher = "Institute of Electrical and Electronics Engineers", number = "10", }
@inproceedings{b6af044eac0b416fbf1006c4e8d326bf, title = "Designing for experiences with socially interactive robots", abstract = "Socially interactive technologies are emerging as one of the predominant technologies of the future. In this workshop, we aim to discuss the emerging field of Social Robotic technologies with a particular focus on interaction design methodologies used in the design process. The workshop will investigate how researchers have approached designing social robots and what we can learn from the interaction design field for future designs. The main activities of the workshop will encompass two interactive sessions and a discussion panel on approaches to inspire the design of socially interactive robots. In particular, we focus on experience-driven design methods involving rituals and memorable experiences with social robots.", keywords = "Design, Social, Social Robot, Technology, User Experience", author = "Mohammad Obaid and Kirsikka Kaipainen and Ioana Ocnarescu and Aino Ahtinen", year = "2018", month = "9", day = "29", doi = "10.1145/3240167.3240257", language = "English", pages = "948--951", booktitle = "NordiCHI 2018", publisher = "ACM", }
@inproceedings{44d3b5373f3e4b36bb1593b6b7ee3c56, title = "Understanding animals: A critical challenge in ACI", abstract = "We present a qualitative content analysis of visual-verbal social media posts, where ordinary dog owners pretend to be their canine, to identify meaningful facets in their dogs' life-worlds, e.g. pleasures of human-dog relation, dog-dog relations, food etc. We use this knowledge to inform design of “quantified pets”. The study targets a general problem in Animal-Computer Interaction (ACI), i.e. to understand animals when designing “for” them, although lacking a common language. Several approaches, e.g. ethnography and participatory design, have been appropriated from HCI without exhausting the issue. We argue for a methodological creativity and pluralism by suggesting an additional approach drawing on “kinesthetic empathy”. It implies to understand animals by empathizing with their bodily movements over time and decoding the realities of their life-worlds. This, and other related approaches, has inspired animal researchers to conduct more or less radical participant observations during extensive duration to understand the perspective of the other. We suggest that dog owners whom share their lives with their dogs already possess a similar understanding as these experts, and thus uphold important experiences of canine life that could be used to understand individual dogs and inspire design.", keywords = "Animal-Computer Interaction, Dog Blogs, Kinesthetic Empathy, Pet Dogs, Quantified Pets, Social Media", author = "Fredrik Aspling and Oskar Juhlin and Heli V{\"a}{\"a}t{\"a}j{\"a}", year = "2018", month = "9", day = "29", doi = "10.1145/3240167.3240226", language = "English", pages = "148--160", booktitle = "NordiCHI 2018", publisher = "ACM", }
@inproceedings{ca5efef64fba4d3f97e65fa51150673c, title = "A joint target localization and classification framework for sensor networks", abstract = "In this paper, we propose a joint framework for target localization and classification using a single generalized model for non-imaging based multi-modal sensor data. For target localization, we exploit both sensor data and estimated dynamics within a local neighborhood. We validate the capabilities of our framework by using a multi-modal dataset, which includes ground truth GPS information (e.g., time and position) and data from co-located seismic and acoustic sensors. Experimental results show that our framework achieves better classification accuracy compared to recent fusion algorithms using temporal accumulation and achieves more accurate target localizations than multilateration.", keywords = "Classification, Localization, Sensor fusion, Sensor networks, Tracking", author = "Kyunghun Lee and Riggan, {Benjamin S.} and Bhattacharyya, {Shuvra S.}", note = "JUFOID=57409", year = "2018", month = "9", day = "10", doi = "10.1109/ICASSP.2018.8462641", language = "English", isbn = "9781538646588", volume = "2018-April", publisher = "Institute of Electrical and Electronics Engineers Inc.", pages = "3076--3080", booktitle = "2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings", address = "United States", }
@inproceedings{47d204941ed84a88907e2e85aedb70a9, title = "Estimation of time-varying room impulse responses of multiple sound sources from observed mixture and isolated source signals", abstract = "This paper proposes a method for online estimation of time-varying room impulse responses (RIR) between multiple isolated sound sources and a far-field mixture. The algorithm is formulated as adaptive convolutive filtering in short-time Fourier transform (STFT) domain. We use the recursive least squares (RLS) algorithm for estimating the filter parameters due to its fast convergence rate, which is required for modeling rapidly changing RIRs of moving sound sources. The proposed method allows separation of reverberated sources from the far-field mixture given that their close-field signals are available. The evaluation is based on measuring unmixing performance (removal of reverberated source) using objective separation criteria calculated between the ground truth recording of the preserved sources and the unmixing result obtained with the proposed algorithm. We compare online and offline formulations for the RIR estimation and also provide evaluation with blind source separation algorithm only operating on the mixture signal.", keywords = "Adaptive filtering, Informed source separation, Online room impulse response estimation, Source unmixing", author = "Joonas Nikunen and Tuomas Virtanen", note = "jufoid=57409", year = "2018", month = "9", day = "10", doi = "10.1109/ICASSP.2018.8462535", language = "English", isbn = "9781538646588", volume = "2018-April", series = "Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing", publisher = "Institute of Electrical and Electronics Engineers Inc.", pages = "421--425", booktitle = "2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings", address = "United States", }
@inproceedings{a2edec98474a46399a73d1bb60b9653b, title = "Low-energy graph fourier basis functions span salient objects", abstract = "There is an emerging interest aiming at defining principles for signals on general graphs, which are analogous to the basic principles in traditional signal processing. One example is the Graph Fourier Transform which aims at decomposing a graph signal into its components based on a set of basis functions with corresponding graph frequencies. It has been observed that most of the important information of a graph signal is contained inside the low frequency band, which leads to several applications such as denoising, compression, etc. In this paper, we show that the low frequency basis functions span the salient regions in an image, which can also be considered as important regions. Motivated by this, we present a novel simple and unsupervised method to utilize a number of low-energy basis functions and show that it improves the performance of seven state-of-the-art salient object detection methods in five datasets under four different evaluation criteria, with only minor exceptions.", keywords = "Graph fourier transform, Graph signal processing, Salient object detection", author = "Junaid Malik and Caglar Aytekin and Moncef Gabbouj", note = "jufoid=57409", year = "2018", month = "9", day = "10", doi = "10.1109/ICASSP.2018.8462672", language = "English", isbn = "9781538646588", volume = "2018-April", publisher = "Institute of Electrical and Electronics Engineers Inc.", pages = "1548--1552", booktitle = "2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings", address = "United States", }
@inproceedings{49f298fc46254a76b45290a5aafd1daf, title = "Statistical Evaluation of Visual Quality Metrics for Image Denoising", abstract = "This paper studies the problem of full reference visual quality assessment of denoised images with a special emphasis on images with low contrast and noise-like texture. Denoising of such images together with noise removal often results in image details loss or smoothing. A new test image database, FLT, containing 75 noise-free 'reference' images and 300 filtered ('distorted') images is developed. Each reference image, corrupted by an additive white Gaussian noise, is denoised by the BM3D filter with four different values of threshold parameter (four levels of noise suppression). After carrying out a perceptual quality assessment of distorted images, the mean opinion scores (MOS) are obtained and compared with the values of known full reference quality metrics. As a result, the Spearman Rank Order Correlation Coefficient (SROCC) between PSNR values and MOS has a value close to zero, and SROCC between values of known full-reference image visual quality metrics and MOS does not exceed 0.82 (which is reached by a new visual quality metric proposed in this paper). The FLT dataset is more complex than earlier datasets used for assessment of visual quality for image denoising. Thus, it can be effectively used to design new image visual quality metrics for image denoising.", keywords = "BM3D, Full-reference metrics, Image denoising, Image visual quality assessment", author = "Karen Egiazarian and Mykola Ponomarenko and Vladimir Lukin and Oleg Ieremeiev", note = "EXT={"}Lukin, Vladimir{"} JUFOID=57409", year = "2018", month = "9", day = "10", doi = "10.1109/ICASSP.2018.8462294", language = "English", isbn = "9781538646588", volume = "2018-April", publisher = "Institute of Electrical and Electronics Engineers Inc.", pages = "6752--6756", booktitle = "2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings", address = "United States", }
@inproceedings{d502d95fb8184a8a862f1803ce2de9ee, title = "Low latency edge rendering scheme for interactive 360 degree virtual reality gaming", abstract = "This paper describes the core functionality and a proof-of-concept demonstration setup for remote 360 degree stereo virtual reality (VR) gaming. In this end-to-end scheme, the execution of a VR game is off-loaded from an end user device to a cloud edge server in which the executed game is rendered based on user's field of view (FoV) and control actions. Headset and controller feedback is transmitted over the network to the server from which the rendered views of the game are streamed to a user in real-time as encoded HEVC video frames. This approach saves energy and computation load of the end terminals by making use of the latest advancements in network connection speed and quality. In the showcased demonstration, a VR game is run in Unity on a laptop powered by i7 7820HK processor and GTX 1070 GPU. The 360 degree spherical view of the game is rendered and converted to a rectangular frame using equirectangular projection (ERP). The ERP video is sliced vertically and only the FoV is encoded with Kvazaar HEVC encoder in real time and sent over the network in UDP packets. Another laptop is used for playback with a HTC Vive VR headset. Our system can reach an end-to-end latency of 30 ms and bit rate of 20 Mbps for stereo 1080p30 format.", keywords = "360 degree video, Edge computing, High Efficiency Video Coding (HEVC), Video coding, Virtual reality (VR)", author = "Marko Viitanen and Jarno Vanne and H{\"a}m{\"a}l{\"a}inen, {Timo D.} and Ari Kulmala", note = "jufoid=58061e", year = "2018", month = "7", day = "19", doi = "10.1109/ICDCS.2018.00168", language = "English", publisher = "IEEE", pages = "1557--1560", booktitle = "Proceedings - 2018 IEEE 38th International Conference on Distributed Computing Systems, ICDCS 2018", }
@inproceedings{161ecb31b34e47b28c42b9f2b93b8efd, title = "Liking the game: How can spectating motivations influence social media usage at live esports events?", abstract = "There is no doubt that various social media services shape the ways in which we approach our daily lives. The ubiquitous nature of these services, afforded by mobile devices, means that we can take them with us wherever we go — including when we attend live events. Uncovering why individuals use social media during live events can help improve event organization, marketing, and the experiences of attendees. Our understanding of the motivations for using social media during live events is, however, still lacking in depth, especially in regard to emerging live events such as esports. This study aims to answer the question: what motivates the use of social media during live esports events? Data was gathered via a survey (N=255) at the ‘Assembly 2016’ LAN-event, a major live esports event. We examine the relationships between using various social media services and the motivations for esports spectating, through the Motivation Scale for Sports Consumption. While the results indicate that using social media services while attending Assembly 2016 was quite popular, it seemed that in many cases social media usage was a distraction from esports spectating, a core activity of the event. The results provide implications as to how marketers of live esports events should encourage or control usage of social media by attendees.", keywords = "Esports, Live events, Motivation, Social media, Sports consumption", author = "Max Sj{\"o}blom and Lobna Hassan and Joseph Macey and Maria T{\"o}rh{\"o}nen and Juho Hamari", note = "EXT={"}T{\"o}rh{\"o}nen, Maria{"} DUPL=44481582", year = "2018", month = "7", day = "18", doi = "10.1145/3217804.3217908", language = "English", isbn = "9781450363341", pages = "160--167", booktitle = "Proceedings of the 9th International Conference on Social Media and Society, SMSociety 2018", publisher = "ACM", }
@inproceedings{d6b452cec3e64ecea580f7f46269f9f5, title = "Code notes: Designing a low-cost tangible coding tool for/with children", abstract = "Programming has become an essential subject for today's education curriculum and as a result, the importance of creating the right environments to teach is increasing. For such environments, featuring tangible tools enhances creativity and collaboration. However, due to their high prices, current tangible tools are not reachable by most of the students. We developed Code Notes as a low-cost, attainable and tangible tool aimed to motivate children to support programming education. Code Notes is comprised of an Android app and code-cardboards to teach the basic concepts in programming. We continue to develop the platform with insights gained from children. This paper shares the design phases of Code Notes and observations from our two-month programming project. We also presented some future concepts of Code Notes that offer an active and embodied interaction with the teaching material.", keywords = "Affordable systems for education, Collaborative learning environments, Mobile learning, Tangible blocks.", author = "Alpay Sabuncuoǧlu and Merve Erkaya and Buruk, {Oǧuz Turan} and Tilbe G{\"o}ksun", year = "2018", month = "6", day = "19", doi = "10.1145/3202185.3210791", language = "English", pages = "644--649", booktitle = "IDC 2018 - Proceedings of the 2018 ACM Conference on Interaction Design and Children", publisher = "ACM", }
@inproceedings{329e735b7a8547cb89bf32a292732df2, title = "Fast and easy live video service setup using lightweight virtualization", abstract = "The service broker provides service providers with virtualized services that can be initialized rapidly and scaled up or down on demand. This demonstration paper describes how a service provider can set up a new video distribution service to end users with a diminutive effort. Our proposal makes use of Docker lightweight virtualization technologies that pack services in containers. This makes it possible to implement video coding and content delivery networks that are scalable and consume resources only when needed. The demonstration showcases a scenario where a video service provider sets up a new live video distribution service to end users. After the setup, live 720p30 video camera feed is encoded in real-time, streamed in HEVC MPEG-DASH format over CDN network, and accessed with a HbbTV compatible set-top-box. This end-to-end system illustrates that virtualization causes no significant resource or performance overhead but is a perfect match for online video services.", keywords = "Content Delivery Network (CDN), Docker, Dynamic adaptive streaming over HTTP (DASH), High Efficiency Video Coding (HEVC), Hybrid broadcast broadband TV (HbbTV), Virtualization", author = "Antti Heikkinen and Pekka P{\"a}{\"a}kk{\"o}nen and Marko Viitanen and Jarno Vanne and Tommi Riikonen and Kagan Bakanoglu", year = "2018", month = "6", day = "12", doi = "10.1145/3204949.3208112", language = "English", pages = "487--489", booktitle = "Proceedings of the 9th ACM Multimedia Systems Conference, MMSys 2018", publisher = "ACM", }
@inproceedings{52dd7fcdd43b4654aa84894fba4e2f31, title = "Optimized viewport dependent streaming of stereoscopic omnidirectional video", abstract = "Streaming the whole omnidirectional video at high quality is less efficient in terms of bandwidth requirements and decoding complexity, since only a small part of the 360-degree horizontal field of view can be seen by a user at a given point in time. In Viewport Dependent Streaming (VDS) only the current user viewport is streamed at high quality, while the remaining parts are streamed at lower quality. This technology may save streaming bandwidth considerably, especially when it is associated to other techniques. Among the others, asymmetric stereoscopic video, has been studied in the past for traditional video and displays. We focused our research on the usage of asymmetric stereoscopic video for omnidirectional streams watched with a Head Mounted Display (HMD) in VDS. We conducted two subjective quality experiments with the main goal of reducing the streaming bandwidth, while keeping the subjective video quality at the highest level. We assessed asymmetric video applied separately to the foreground and background views of omnidirectional VDS sessions. We show that for VDS, applying asymmetric stereoscopic streaming delivery on the foreground view can save up to 41{\%} bit rate, and using the same technique on the background view can save approximately up to 15{\%} bit rate. Furthermore, eye dominance was seen not to be relevant in our experiments.", keywords = "360 degrees video, Asymmetric video, Omnidirectional video, Streaming adaptation, Subjective quality evaluation, Virtual reality streaming", author = "Deepa Naik and Curcio, {Igor D.D.} and Henri Toukomaa", note = "EXT={"}Curcio, Igor D.D.{"}", year = "2018", month = "6", day = "12", doi = "10.1145/3210424.3210437", language = "English", pages = "37--42", booktitle = "Proceedings of the 23th ACM Workshop on Packet Video, PV 2018", publisher = "ACM", }
@article{869baf1d880e4d77ba3c52149607a691, title = "A quasi-virtual online analyser based on an artificial neural networks and offline measurements to predict purities of raffinate/extract in simulated moving bed processes", abstract = "The quality control and optimization of Simulated Moving Bed processes are still a challenge. Among the main reasons for that, the real time measurement of its main properties can be highlighted. Further developments in this field are necessary in order to allow the development of better control and optimization systems of these units. In the present work, a system composed by two Artificial Neural Networks working concomitantly with an offline measurement system is proposed, named Quasi-Virtual Analyser (Q-VOA) system. The development of the Q-VOA is presented and the system is simulated in order to evaluate its efficiency. The methodology used to select the input variables for the Q-VOA is another contribution of this work. The results show that the Q-VOA is capable of reducing the system errors and keep the prediction closer to the process true responses, when compared with the simple VOA system, which is based solely on model predictions. Furthermore, the results show the efficiency of the measurement system even under the presence of non-measured perturbations.", keywords = "Artificial neural network, Enantiomers separation, Purity measurement, Quasi-virtual analyser system, True moving bed", author = "Nogueira, {Idelfonso B.R.} and Ribeiro, {Ana M.} and Reiner Requi{\~a}o and Pontes, {Karen V.} and Hannu Koivisto and Rodrigues, {Al{\'i}rio E.} and Loureiro, {Jos{\'e} M.}", year = "2018", month = "6", day = "1", doi = "10.1016/j.asoc.2018.03.001", language = "English", volume = "67", pages = "29--47", journal = "Applied Soft Computing", issn = "1568-4946", publisher = "Elsevier", }
@inproceedings{be73865b30aa4944bbaaf9c59f2e498d, title = "Looking for a five-legged sheep: Identifying enterprise architects' skills and competencies", abstract = "Enterprise architecture (EA) is a holistic approach to comprehend the organization's business objectives and processes, data resources, information systems and information technologies. To advance EA activities, organizations need a myriad of different skills and competences both from individual enterprise architects and from architect teams. However, research on these skills and competences is scarce. Not knowing what skills are actually needed might be one of the reasons why public sector EA endeavors have been very problematic. In this paper, we conduct a qualitative survey among enterprise architects themselves to identify which skills they consider essential for EA work. Our results indicate that the range of skills is great, and finding an expert with all appropriate competencies is like looking for a fivelegged sheep.", author = "M. Ylinen and Samuli Pekkola", year = "2018", month = "5", day = "30", doi = "10.1145/3209281.3209353", language = "English", booktitle = "Proceedings of the 19th Annual International Conference on Digital Government Research", publisher = "ACM", }
@inproceedings{d621fecc1830490a8692a0aeaa7546ee, title = "Toward efficient many-core scheduling of partial expansion graphs", abstract = "Transformation of synchronous data flow graphs (SDF) into equivalent homogeneous SDF representations has been extensively applied as a pre-processing stage when mapping signal processing algorithms onto parallel platforms. While this transformation helps fully expose task and data parallelism, it also presents several limitations such as an exponential increase in the number of actors and excessive communication overhead. Partial expansion graphs were introduced to address these limitations for multi-core platforms. However, existing solutions are not well-suited to achieve efficient scheduling on many-core architectures. In this article, we develop a new approach that employs cyclo-static data flow techniques to provide a simple but efficient method of coordinating the data production and consumption in the expanded graphs. We demonstrate the advantage of our approach through experiments on real application models.", author = "Tran, {Hai Nam} and Bhattacharyya, {Shuvra S.} and Talpin, {Jean Pierre} and Thierry Gautier", year = "2018", month = "5", day = "28", doi = "10.1145/3207719.3207734", language = "English", isbn = "9781450357807", pages = "100--103", booktitle = "Proceedings of the 21st International Workshop on Software and Compilers for Embedded Systems, SCOPES 2018", publisher = "Association for Computing Machinery, Inc", }
@article{8f16d929a7314de1b45105835243cf51, title = "Preface: Special Issue on ‘New Hydraulic Components for Tough Robots’", author = "Koichi Suzumori and Hyon, {Sang Ho} and Claudio Semini and Jouni Mattila and Takefumi Kanda", year = "2018", month = "5", day = "3", doi = "10.1080/01691864.2018.1466427", language = "English", volume = "32", journal = "Advanced Robotics", issn = "0169-1864", publisher = "Taylor & Francis", number = "9", }
@article{a8b4338762ad44b58b811278281bfa31, title = "On the Definition of Microservice Bad Smells", abstract = "Code smells and architectural smells (also called bad smells) are symptoms of poor design that can hinder code understandability and decrease maintainability. Several bad smells have been defined in the literature for both generic architectures and specific architectures. However, cloud-native applications based on microservices can be affected by other types of issues. In order to identify a set of microservice-specific bad smells, researchers collected evidence of bad practices by interviewing 72 developers with experience in developing systems based on microservices. Then, they classified the bad practices into a catalog of 11 microservice-specific bad smells frequently considered harmful by practitioners. The results can be used by practitioners and researchers as a guideline to avoid experiencing the same difficult situations in the systems they develop.", keywords = "anti-pattern, antipattern, architectural smell, bad smell, cloud computing, code smell, microservice, software development, software engineering", author = "Davide Taibi and Valentina Lenarduzzi", year = "2018", month = "5", day = "1", doi = "10.1109/MS.2018.2141031", language = "English", volume = "35", pages = "56--62", journal = "IEEE Software", issn = "0740-7459", publisher = "Institute of Electrical and Electronics Engineers", number = "3", }
@article{e34acf2e4fca48ad9156aceb0c122930, title = "Backshoring of production in the context of a small and open Nordic economy", abstract = "Purpose – The purpose of this paper is to investigate the extent, drivers, and conditions underlying backshoring in the Finnish manufacturing industry, comparing the results to the wider ongoing relocation of production in the international context. Design/methodology/approach – The survey of 229 Finnish manufacturing firms reveals the background, drivers, and patterns of offshoring and backshoring. Findings – Companies that had transferred their production back to Finland were more commonly in industries with relatively higher technology intensity and they were typically larger than the no-movement companies, and with a higher number of plants. They also reported more commonly having a corporate-wide strategy for guiding production location decisions. Research limitations/implications – Backshoring activity in the small and open economy of Finland seems to be higher compared to earlier studies in larger countries. The findings suggest that there is a transformation in the manufacturing industries with some gradual replacement of labor-intensive and lower technology-intensive industries toward higher technology-intensive industries. Practical implications – Moving production across national borders is one option in the strategies of firms to stay competitive. Companies must carefully consider the relevance of various decision-making drivers when determining strategies for their production networks. Social implications – Manufacturing industries have traditionally been important for employment in the relatively small and open economies of the Nordic countries. From the social perspective, it is important to understand the ongoing transformation and its implications. Originality/value – There are few empirical studies available of the ongoing backshoring movement, utilizing data from company decision makers instead of macroeconomic factors.", keywords = "Manufacturing, Manufacturing strategy, Production", author = "Jussi Heikkil{\"a} and Miia Martinsuo and Sanna Nenonen", year = "2018", month = "5", doi = "10.1108/JMTM-12-2016-0178", language = "English", volume = "29", pages = "658--675", journal = "Journal of Manufacturing Technology Management", issn = "1741-038X", publisher = "Emerald", number = "4", }
@inproceedings{98559801f4f04d59b1f79aaf16f96415, title = "Towards secure cloud orchestration for multi-cloud deployments", abstract = "Cloud orchestration frameworks are commonly used to deploy and operate cloud infrastructure. Their role spans both vertically (deployment on infrastructure, platform, application and microservice levels) and horizontally (deployments from many distinct cloud resource providers). However, despite the central role of orchestration, the popular orchestration frameworks lack mechanisms to provide security guarantees for cloud operators. In this work, we analyze the security landscape of cloud orchestration frameworks for multi-cloud infrastructure. We identify a set of attack scenarios, define security enforcement enablers and propose an architecture for a security-enabled cloud orchestration framework for multi-cloud application deployments.", keywords = "Cloud infrastructure, Microser-vices, Orchestration, Security, Virtualization", author = "Nicolae Paladi and Antonios Michalas and Dang, {Hai Van}", year = "2018", month = "4", day = "23", doi = "10.1145/3195870.3195874", language = "English", booktitle = "CrossCloud 2018 - 5th Workshop on CrossCloud Infrastructures and Platforms, colocated with EuroSys 2018", publisher = "ACM", }
@inproceedings{6bc47fc8ac704d40a892d1b0fc24c847, title = "Ripple thermostat: Affecting the emotional experience through interactive force feedback and shape change", abstract = "Force feedback and shape change are modalities with a growing application potential beyond the more traditional GUIs. We present two studies that explored the effect of these modalities on the emotional experience when interacting with an intelligent thermostat. The first study compared visual feedback, force feedback, and a combination of force feedback and shape change. Results indicate that force feedback correlates to experienced dominance during interaction, while shape change mainly affects experienced arousal. The second study explored how force feedback and shape change could communicate affective meaning during interaction with the thermostat through a co-design study. Participants designed the thermostat behavior for three scenarios supporting energy savings. Results suggest that despite their abstractness, force feedback and shape change convey affective meaning during the user-system dialogue. The findings contribute to the design of intelligible and intuitive feedback.", keywords = "Actuated interfaces, Affective computing, Haptic force feedback, Shape-changing interfaces", author = "{Van Oosterhout}, Anke and Alonso, {Miguel Bruns} and Satu Jumisko-Pyykk{\"o}", year = "2018", month = "4", day = "20", doi = "10.1145/3173574.3174229", language = "English", booktitle = "Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems", publisher = "ACM", }
@inproceedings{bf1580933abb458e81256b4e4b46aa0e, title = "A design tool for high performance image processing on multicore platforms", abstract = "Design and implementation of smart vision systems often involve the mapping of complex image processing algorithms into efficient, real-time implementations on multicore platforms. In this paper, we describe a novel design tool that is developed to address this important challenge. A key component of the tool is a new approach to hierarchical dataflow scheduling that integrates a global scheduler and multiple local schedulers. The local schedulers are lightweight modules that work independently. The global scheduler interacts with the local schedulers to optimize overall memory usage and execution time. The proposed design tool is demonstrated through a case study involving an image stitching application for large scale microscopy images.", author = "Jiahao Wu and Timothy Blattner and Walid Keyrouz and Bhattacharyya, {Shuvra S.}", year = "2018", month = "4", day = "19", doi = "10.23919/DATE.2018.8342215", language = "English", pages = "1304--1309", booktitle = "Proceedings of the 2018 Design, Automation and Test in Europe Conference and Exhibition, DATE 2018", publisher = "IEEE", }
@inproceedings{f27a9a72c86a4b61ba663812f13a0f5d, title = "Deep multiresolution color constancy", abstract = "In this paper, a computational color constancy method is proposed via estimating the illuminant chromaticity in a scene by pooling from many local estimates. To this end, first, for each image in a dataset, we form an image pyramid consisting of several scales of the original image. Next, local patches of certain size are extracted from each scale in this image pyramid. Then, a convolutional neural network is trained to estimate the illuminant chromaticity per-patch. Finally, two more consecutive trainings are conducted, where the estimation is made per-image via taking the mean (1st training) and median (2nd training) of local estimates. The proposed method is shown to outperform the state-of-the-art in a widely used color constancy dataset.", keywords = "Color constancy, Deep learning, Illuminant chromaticity estimation, Local estimation, Multi-resolution", author = "Caglar Aytekin and Jarno Nikkanen and Moncef Gabbouj", note = "jufoid=57423", year = "2018", month = "2", day = "20", doi = "10.1109/ICIP.2017.8296980", language = "English", publisher = "IEEE COMPUTER SOCIETY PRESS", pages = "3735--3739", booktitle = "2017 IEEE International Conference on Image Processing, ICIP 2017 - Proceedings", }
@inproceedings{6d67c1f836b144ea873987b0a3a21503, title = "A multi-agent approach for processing industrial enterprise data", abstract = "The C2NET project aims to provide cloud-based platform for the supply chain interactions. The architecture of such platform includes a Data Collection Framework (DCF) for managing the collection of the company's data. The DCF collects, transforms and stores data from both Internet of Things (IoT) devices in the factory shopfloor and company enterprises data via two types of hub; Legacy system hub (LSH) and IoT hub. Since the C2NET, targets the Small and Medium-sized Enterprises (SMEs), the enterprise data, or legacy data as called in the C2NET project, can be provided via excel files. Thus, this research work highlights a technique for processing the excel files in the LSHs. This technique adopts the concept of Multi-Agent Systems for processing the data as table in the excel files in the LSH. The multi-agent approach allows the LSH to process any excel file regardless the complexity in the data structure or in the file table. Furthermore, the presented approach enhances the processing of the excel files in different aspects, such as the size of the excel file or the required processing power.", keywords = "Cloud Based, Data Collection, Enterprise, Multi-Agent Systems, supply Chain", author = "Mohammed, {Wael M.} and Ferrer, {Borja Ramis} and Martinez, {Jose L.} and Raquel Sanchis and Beatriz Andres and Carlos Agostinho", year = "2018", month = "2", day = "2", doi = "10.1109/ICE.2017.8280018", language = "English", pages = "1209--1215", booktitle = "2017 International Conference on Engineering, Technology and Innovation", publisher = "IEEE", }
@inproceedings{2a1fb9ae85cc4cd489ee658cdc9cd82f, title = "An approach to production scheduling optimization a case of an oil lubrication and hydraulic systems manufacturer", abstract = "Cloud-enabled tools developed in the Cloud Collaborative Manufacturing Networks (C2NET) project address the needs of small and medium enterprises with respect to information exchange and visibility across the collaboration partners in the supply network, coupled with automated and collaborative production planning and supply management. This paper analyses a case of an oil lubrication and hydraulic systems manufacturer and describes a pilot application of C2NET where the production schedule is optimized according to the priorities of the pilot company. In this case the goal is a highly adaptive just-in-time manufacturing schedule with guaranteed on time delivery.", keywords = "cloud-supported manufacturing, enterprise collaboration, information exchange, just-in-time manufacturing, Mixed-Integer Linear Programming, on time delivery, optimization, production scheduling, Small and Medium size Enterprise, supply network", author = "Artem Katasonov and Toni Lastusilta and Timo Korvola and Leila Saari and Dan Bendas and Mohammed, {Wael M.} and Lee, {Angelica Nieto}", year = "2018", month = "2", day = "2", doi = "10.1109/ICE.2017.8280007", language = "English", pages = "1123--1130", booktitle = "2017 International Conference on Engineering, Technology and Innovation", publisher = "IEEE", }
@inproceedings{696ae602af2d40f0801664be7f85332a, title = "Configuring and visualizing the data resources in a cloud-based data collection framework", abstract = "The Manufacturing Enterprise Solutions Association (MESA) provided the abstract and general definition of the Manufacturing Execution Systems (MES). A dedicated function has been reserved for the data collection activities. In this matter, the Cloud Collaborative Manufacturing Networks (C2NET) project tends to provide a cloud based platform for hosting the interactions of the supply chain in a collaborative network. Within the architecture of the C2NET project, a Data Collection Framework (DCF) is designed to fulfill the function of data collection. This allows the companies to provide their data, which can be both enterprise and Internet of Things (IoT) devices type of data to the platform for further use. The collection of the data is achieved by a specific third party application, i.e., the Legacy System Hub (LSH). This research work presents the approach of configuring and visualizing the data resources in the C2NET platform. This approach employs the web-based applications and the help of the LSH. This permits the C2NET platform to adapt to any kind of third party application, which manipulates enterprise data, following the generic and flexible solution of this approach.", keywords = "Cloud Based, Data Collection, Data Resources, Supply Chain, Visualization", author = "Mohammed, {Wael M.} and Ferrer, {Borja Ramis} and L. Jose and Martinez Lastra and David Aleixo and Carlos Agostinho", note = "INT=aut,{"}Jose, L.{"}", year = "2018", month = "2", day = "2", doi = "10.1109/ICE.2017.8280017", language = "English", pages = "1201--1208", booktitle = "2017 International Conference on Engineering, Technology and Innovation", publisher = "IEEE", }
@inproceedings{8c8dbfc067f04ea090fb2134b451bc30, title = "Exploiting suppliers' potential in construction innovations", abstract = "There is a need to understand ways to enhance innovations in the construction industry. It is argued that suppliers have potential to develop new innovations, but they are largely neglected in earlier construction-related research. This research focuses on suppliers' role in construction innovations, and the aim of the research is to increase understanding of practices for exploiting suppliers' potential in that context. A qualitative, explanatory research strategy is employed in the context of construction industry in Finland. Eighteen interviews are conducted with contractors to discover experiences and practices related to suppliers' potential in construction innovations. The results reveal practices for exploiting supplier's potential in construction innovations. As a key contribution, the research shows that suppliers have an important role in construction innovation but exploitation of suppliers' potential is still rather underdeveloped.", keywords = "construction innovation, project networks, supplier management", author = "Rami Sariola", year = "2018", month = "2", day = "2", doi = "10.1109/ICE.2017.8279950", language = "English", pages = "678--684", booktitle = "2017 International Conference on Engineering, Technology and Innovation", publisher = "IEEE", }
@article{55e60c58ed934395b9a45b07bf4ae8c6, title = "Memory-Constrained vectorization and scheduling of dataflow graphs for hybrid CPU-GPU platforms", abstract = "The increasing use of heterogeneous embedded systems with multi-core CPUs and Graphics Processing Units (GPUs) presents important challenges in effectively exploiting pipeline, task, and data-level parallelism to meet throughput requirements of digital signal processing applications. Moreover, in the presence of system-level memory constraints, hand optimization of code to satisfy these requirements is inefficient and error prone and can therefore, greatly slow down development time or result in highly underutilized processing resources. In this article, we present vectorization and scheduling methods to effectively exploit multiple forms of parallelism for throughput optimization on hybrid CPU-GPU platforms, while conforming to system-level memory constraints. The methods operate on synchronous dataflow representations, which are widely used in the design of embedded systems for signal and information processing. We show that our novel methods can significantly improve system throughput compared to previous vectorization and scheduling approaches under the same memory constraints. In addition, we present a practical case-study of applying our methods to significantly improve the throughput of an orthogonal frequency division multiplexing receiver system for wireless communications.", keywords = "Dataflow models, Design optimization, Heterogeneous computing, Signal processing systems, Software synthesis", author = "Shuoxin Lin and Jiahao Wu and Bhattacharyya, {Shuvra S.}", year = "2018", month = "2", day = "1", doi = "10.1145/3157669", language = "English", volume = "17", journal = "ACM Transactions on Embedded Computing Systems", issn = "1539-9087", publisher = "Association for Computing Machinery", number = "2", }
@article{02962792d79e48a99cf391a850c17523, title = "Feature synthesis for image classification and retrieval via one-against-all perceptrons", abstract = "Most existing content-based image retrieval and classification systems rely on low-level features which are automatically extracted from images. However, often these features lack the discrimination power needed for accurate description of the image content, and hence, they may lead to a poor retrieval or classification performance. We propose a novel technique to improve low-level features which uses parallel one-against-all perceptrons to synthesize new features with a higher discrimination power which in turn leads to improved classification and retrieval results. The proposed method can be applied on any database and low-level features as long as some ground-truth information is available. The main merits of the proposed technique are its simplicity and faster computation compared to existing feature synthesis methods. Extensive simulation results show a significant improvement in the features’ discrimination power.", keywords = "Content-based image retrieval and classification, Feature synthesis, Multi-dimensional particle swarm optimization, Multi-layer perceptrons", author = "Jenni Raitoharju and Serkan Kiranyaz and Moncef Gabbouj", note = "EXT={"}Kiranyaz, Serkan{"}", year = "2018", month = "2", doi = "10.1007/s00521-016-2504-4", language = "English", volume = "29", pages = "943–957", journal = "Neural Computing and Applications", issn = "0941-0643", publisher = "Springer Verlag", number = "4", }
@article{4d4836de626d441cb3b26e34f63ee8a7, title = "A Dataset for Camera Independent Color Constancy", abstract = "In this paper, we provide a novel dataset designed for camera independent color constancy research. Camera independence corresponds to the robustness of an algorithm’s performance when run on images of the same scene taken by different cameras. Accordingly, the images in our database correspond to several lab and field scenes each of which is captured by three different cameras with minimal registration errors. The lab scenes are also captured under five different illuminations. The spectral responses of cameras and the spectral power distributions of the lab light sources are also provided, as they may prove beneficial for training future algorithms to achieve color constancy. For a fair evaluation of future methods, we provide guidelines for supervised methods with indicated training, validation and testing partitions. Accordingly, we evaluate two recently proposed convolutional neural network based color constancy algorithms as baselines for future research. As a side contribution, this dataset also includes images taken by a mobile camera with color shading corrected and uncorrected results. This allows research on the effect of color shading as well.", keywords = "Cameras, Color constancy, color shading, illumination estimation, Image color analysis, Lighting, platform independence, Reflectivity, Robustness, Sensitivity, Training", author = "Caglar Aytekin and Jarno Nikkanen and Moncef Gabbouj", year = "2018", doi = "10.1109/TIP.2017.2764264", language = "English", volume = "27", pages = "530--544", journal = "IEEE Transactions on Image Processing", issn = "1057-7149", publisher = "Institute of Electrical and Electronics Engineers", number = "2", }
@article{f5f9383038674e16af2018db8f8f0d31, title = "An algebraic approach to reducing the number of variables of incompletely defined discrete functions", abstract = "In this paper, we consider incompletely defined discrete functions, i.e., Boolean and multiple-valued functions, f : S → {0, 1, . . . , q - 1} where S ⊆ {0, 1, . . . , q - 1}n i.e., the function value is specified only on a certain subset S of the domain of the corresponding completely defined function. We assume the function to be sparse i.e. |S| is 'small' relative to the cardinality of the domain. We show that by embedding the domain {0, 1, . . . , q - 1}n , where n is the number of variables and q is a prime power, in a suitable ring structure, the multiplicative structure of the ring can be used to construct a linear function {0, 1, . . . , q - 1}n → {0, 1, . . . , q - 1}m that is injective on S provided that m > 2 logq |S| + logq (n - 1). In this way we find a linear transform that reduces the number of variables from n to m, and can be used e.g. in implementation of an incompletely defined discrete function by using linear decomposition.", author = "Jaakko Astola and Pekka Astola and Radomir Stanković and Ioan Tabus", note = "EXT={"}Stanković, Radomir{"}", year = "2018", language = "English", volume = "31", pages = "239--253", journal = "Journal of Multiple-Valued Logic and Soft Computing", issn = "1542-3980", publisher = "Old City Publishing", number = "3", }
@inproceedings{977be04fd775470e860b9a05561c7c44, title = "Architectural patterns for microservices: A systematic mapping study", abstract = "Microservices is an architectural style increasing in popularity. However, there is still a lack of understanding how to adopt a microservice-based architectural style. We aim at characterizing different microservice architectural style patterns and the principles that guide their definition. We conducted a systematic mapping study in order to identify reported usage of microservices and based on these use cases extract common patterns and principles. We present two key contributions. Firstly, we identified several agreed microservice architecture patterns that seem widely adopted and reported in the case studies identified. Secondly, we presented these as a catalogue in a common template format including a summary of the advantages, disadvantages, and lessons learned for each pattern from the case studies. We can conclude that different architecture patterns emerge for different migration, orchestration, storage and deployment settings for a set of agreed principles.", keywords = "Architectural style, Architecture pattern, Cloud migration, Cloud native, DevOps, Microservices", author = "Davide Taibi and Valentina Lenarduzzi and Claus Pahl", year = "2018", doi = "10.5220/0006798302210232", language = "English", pages = "221--232", booktitle = "CLOSER 2018 - Proceedings of the 8th International Conference on Cloud Computing and Services Science", publisher = "SCITEPRESS", }
@inproceedings{9c17090ff0ac481ab964b70b52a5fe01, title = "Blind estimation of white Gaussian noise variance in highly textured images", abstract = "In the paper, a new method of blind estimation of noise variance in a single highly textured image is proposed. An input image is divided into 8x8 blocks and discrete cosine transform (DCT) is performed for each block. A part of 64 DCT coefficients with lowest energy calculated through all blocks is selected for further analysis. For the DCT coefficients, a robust estimate of noise variance is calculated. Corresponding to the obtained estimate, a part of blocks having very large values of local variance calculated only for the selected DCT coefficients are excluded from the further analysis. These two steps (estimation of noise variance and exclusion of blocks) are iteratively repeated three times. For the verification of the proposed method, a new noise-free test image database TAMPERE17 consisting of many highly textured images is designed. It is shown for this database and different values of noise variance from the set {25, 49, 100, 225}, that the proposed method provides approximately two times lower estimation root mean square error than other methods.", keywords = "Blind estimation of noise characteristics, Discrete cosine transform (DCT), Noise free test image database", author = "Mykola Ponomarenko and Nikolay Gapon and Viacheslav Voronin and Karen Egiazarian", note = "jufoid=84313", year = "2018", doi = "10.2352/ISSN.2470-1173.2018.13.IPAS-382", language = "English", publisher = "Society for Imaging Science and Technology", booktitle = "Electronic Imaging", address = "United States", }
@inproceedings{f203f881d519462f8fa0efef903d792f, title = "Combined local and global image enhancement algorithm", abstract = "We present a new image enhancement algorithm based on combined local and global image processing. The basic idea is to apply α-rooting image enhancement approach for different image blocks. For this purpose, we split image in moving windows on disjoint blocks with different size (8 by 8, 16 by 16, 32 by 32 and, i.e.). The parameter alfa for every block driven through optimization of measure of enhancement (EME). The resulting image is a weighted mean of all processing blocks. This strategy for image enhancement allows getting more contrast image with the following properties: irregular lighting and brightness gradient. Some experimental results are presented to illustrate the performance of the proposed algorithm.", author = "V. Voronin and E. Semenishchev and M. Ponomarenko and S. Agaian", note = "jufoid=84313", year = "2018", doi = "10.2352/ISSN.2470-1173.2018.13.IPAS-220", language = "English", publisher = "Society for Imaging Science and Technology", booktitle = "Electronic Imaging", address = "United States", }
@inproceedings{880fe0fdb4e14ccaae563a4986a526fb, title = "Compression of signs of DCT coefficients for additional lossless compression of JPEG images", abstract = "One of the main approaches to additional lossless compression of JPEG images is decoding of quantized values of discrete cosine transform (DCT) coefficients and further more effective recompression of the coefficients. Values of amplitudes of DCT coefficients are highly correlated and it is possible to effectively compress them. At the same time, signs of DCT coefficients, which occupy up to 20{\%} of compressed image, are often considered unpredictable. In the paper, a new and effective method for compression of signs of quantized DCT coefficients is proposed. The proposed method takes into account both correlation between DCT coefficients of the same block and correlation between DCT coefficients of neighbor blocks. For each of 64 DCT coefficients, positions of 3 reference coefficients inside the block are determined and stored in the compressed file. Four reference coefficients with fixed positions are used from the neighbor blocks. For all reference coefficients, 15 frequency models to predict signs of a given coefficient are used. All 7 probabilities (that the sign is negative) are mixed by logistic mixing. For test set of JPEG images, we show that the proposed method allows compressing signs of DCT coefficients by 1.1 ⋯ 1.3 times, significantly outperforming nearest analogues.", keywords = "Discrete cosine transform, JPEG, JPEG additional compression, Sign compression", author = "Oleksandr Miroshnichenko and Mykola Ponomarenko and Vladimir Lukin and Karen Egiazarian", note = "jufoid=84313 EXT={"}Lukin, Vladimir{"}", year = "2018", doi = "10.2352/ISSN.2470-1173.2018.13.IPAS-385", language = "English", publisher = "Society for Imaging Science and Technology", booktitle = "Electronic Imaging", address = "United States", }
@inproceedings{2ac6648bef784b8fb93afe61831adfc1, title = "Conversion of sparsely-captured light field into alias-free fullparallax multiview content", abstract = "We propose shearlet decomposition based light field (LF) reconstruction and filtering techniques for mitigating artifacts in the visualized contents of 3D multiview displays. Using the LF reconstruction capability, we first obtain the densely sampled light field (DSLF) of the scene from a sparse set of view images. We design the filter via tiling the Fourier domain of epipolar image by shearlet atoms that are directionally and spatially localized versions of the desired display passband. In this way, it becomes possible to process the DSLF in a depth-dependent manner. That is, the problematic areas in the 3D scene that are outside of the display depth of field (DoF) can be selectively filtered without sacrificing high details in the areas near the display, i.e. inside the DoF. The proposed approach is tested on a synthetic scene and the improvements achieved by means of the quality of the visualized content are verified, where the visualization process is simulated using a geometrical optics model of the human eye.", author = "Erdem Sahin and Suren Vagharshakyan and Robert Bregovic and Gwangsoon Lee and Atanas Gotchev", note = "jufoid=84313", year = "2018", doi = "10.2352/ISSN.2470-1173.2018.04.SDA-144", language = "English", publisher = "Society for Imaging Science and Technology", pages = "1441--1445", booktitle = "Electronic Imaging", address = "United States", }
@inproceedings{75f753d5632c4c359bfa0c8bc9bc053a, title = "Deep p-Fibonacci scattering networks", abstract = "Recently, the use of neural networks for image classification has become widely spread. Thanks to the availability of increased computational power, better performing architectures have been designed, such as the Deep Neural networks. In this work, we propose a novel image representation framework exploiting the Deep p- Fibonacci scattering network. The architecture is based on the structured p-Fibonacci scattering over graph data. This approach allows to provide good accuracy in classification while reducing the computational complexity. Experimental results demonstrate that the performance of the proposed method is comparable to state-of-the-art unsupervised methods while being computationally more efficient.", author = "F. Battisti and M. Carli and {De Paola}, E. and K. Egiazarian", note = "jufoid=84313 EXT={"}Battisti, F.{"} EXT={"}Carli, M.{"}", year = "2018", doi = "10.2352/ISSN.2470-1173.2018.13.IPAS-193", language = "English", publisher = "Society for Imaging Science and Technology", booktitle = "Electronic Imaging", address = "United States", }
@article{c6d1de6acaf84c2f909171333b7ba847, title = "Fair testing and stubborn sets", abstract = "Partial order methods alleviate state explosion by considering only a subset of actions in each constructed state. The choice of the subset depends on the properties that the method promises to preserve. Many methods have been developed ranging from deadlock-preserving to CTL(Formula presented.)-preserving and divergence-sensitive branching bisimilarity preserving. The less the method preserves, the smaller state spaces it constructs. Fair testing equivalence unifies deadlocks with livelocks that cannot be exited and ignores the other livelocks. It is the weakest congruence that preserves whether or not the system may enter a livelock that it cannot leave. We prove that a method that was designed for trace equivalence also preserves fair testing equivalence. We demonstrate its effectiveness on a protocol with a connection and data transfer phase. This is the first practical partial order method that deals with a practical fairness assumption.", keywords = "Fair testing equivalence, Fairness, Partial order methods, Progress, Stubborn sets", author = "Antti Valmari and Walter Vogler", year = "2018", doi = "10.1007/s10009-017-0481-2", language = "English", pages = "589--610", journal = "International Journal on Software Tools for Technology Transfer", issn = "1433-2779", publisher = "Springer Verlag", }
@article{d63167c3140f4d50b38aeb9b7010c8f6, title = "Federated IoT services leveraging 5G technologies at the edge", abstract = "The Internet of Things (IoT) ecosystem is evolving towards the deployment of integrated environments, wherein heterogeneous devices pool their capacities together to match wide-ranging user and service requirements. As a consequence, solutions for efficient and synergistic cooperation among objects acquire great relevance. Along this line, this paper focuses on the adoption of the promising MIFaaS (Mobile-IoT-Federation-as-a-Service) paradigm to support delay-sensitive applications for high-end IoT devices in next-to-come fifth generation (5G) environments. MIFaaS fosters the provisioning of IoT services and applications with low-latency requirements by leveraging cooperation among private/public clouds of IoT objects at the edge of the network. A performance assessment of the MIFaaS paradigm in a cellular 5G environment based on both Long Term Evolution (LTE) and the recent Narrowband IoT (NB-IoT) is presented. Obtained results demonstrate that the proposed solution outperforms classic approaches, highlighting significant benefits derived from the joint use of LTE and NB-IoT bandwidths in terms of increased number of successfully delivered IoT services.", keywords = "5G, IoT, Multi-access edge computing, Narrowband-IoT", author = "I. Farris and A. Orsino and L. Militano and A. Iera and G. Araniti", note = "INT=ELT, {"}Orsino, A.{"}", year = "2018", doi = "10.1016/j.adhoc.2017.09.002", language = "English", volume = "68", pages = "58--69", journal = "Ad Hoc Networks", issn = "1570-8705", publisher = "Elsevier Science Publishers B. V.", }
@article{93f9d9bef353449fa1831d97035f85ef, title = "How to design gamification? A method for engineering gamified software", abstract = "Context: Since its inception around 2010, gamification has become one of the top technology and software trends. However, gamification has also been regarded as one of the most challenging areas of software engineering. Beyond traditional software design requirements, designing gamification requires the command of disciplines such as (motivational/behavioral) psychology, game design, and narratology, making the development of gamified software a challenge for traditional software developers. Gamification software inhabits a finely tuned niche of software engineering that seeks for both high functionality and engagement; beyond technical flawlessness, gamification has to motivate and affect users. Consequently, it has also been projected that most gamified software is doomed to fail. Objective: This paper seeks to advance the understanding of designing gamification and to provide a comprehensive method for developing gamified software. Method: We approach the research problem via a design science research approach; firstly, by synthesizing the current body of literature on gamification design methods and by interviewing 25 gamification experts, producing a comprehensive list of design principles for developing gamified software. Secondly, and more importantly, we develop a detailed method for engineering of gamified software based on the gathered knowledge and design principles. Finally, we conduct an evaluation of the artifacts via interviews of ten gamification experts and implementation of the engineering method in a gamification project. Results: As results of the study, we present the method and key design principles for engineering gamified software. Based on the empirical and expert evaluation, the developed method was deemed as comprehensive, implementable, complete, and useful. We deliver a comprehensive overview of gamification guidelines and shed novel insights into the nature of gamification development and design discourse. Conclusion: This paper takes first steps towards a comprehensive method for gamified software engineering.", keywords = "Design science research, Game design, Gameful design, Gamification, Persuasive technology, Playfulness, Software engineering", author = "Benedikt Morschheuser and Lobna Hassan and Karl Werder and Juho Hamari", year = "2018", doi = "10.1016/j.infsof.2017.10.015", language = "English", volume = "95", pages = "219--237", journal = "Information and Software Technology", issn = "0950-5849", publisher = "Elsevier", }
@article{208c4464e33a45a9bb2247ce59c50454, title = "Information Exchange Architecture for Collaborative Industrial Ecosystem", abstract = "Due to the networked nature of modern industrial business, repeated information exchange activities are necessary. Unfortunately, information exchange is both laborious and expensive with the current communication media, which causes errors and delays. To increase the efficiency of communication, this study introduces an architecture to exchange information in a digitally processable manner in industrial ecosystems. The architecture builds upon commonly agreed business practices and data formats, and an open consortium and information mediators enable it. Following the architecture, a functional prototype has been implemented for a real industrial scenario. This study has its focus on the technical information of equipment, but the architecture concept can also be applied in financing and logistics. Therefore, the concept has potential to completely reform industrial communication.", keywords = "Digital business ecosystem, Industrial information management, Lifecycle management, Multi-sided platform, Operations and maintenance, Systems integration", author = "Petri Kannisto and David H{\"a}stbacka and Arto Marttinen", year = "2018", doi = "10.1007/s10796-018-9877-0", language = "English", pages = "1--16", journal = "Information Systems Frontiers", issn = "1387-3326", publisher = "Springer Verlag", }
@inproceedings{3c1621db37754d74a8cf88fc7eee45a8, title = "Information models and information exchange in plant-wide monitoring and control of industrial processes", abstract = "The efficiency of industrial processes depends on how well the processes can be controlled and this affects the quality, use of resources as well as the environmental impact. Advanced monitoring and control solutions for large-scale industrial processes require information from different systems. The challenge in integration is diverse messaging structures and lack of common semantics in exchange of information between related information systems as well as their human operators. This paper provides a comparison of some of the existing standards of the domain defining suitable structures. Based on these, a model for data and event message structures is developed. The approach builds on a separation of concerns keeping the messaging semantics independent of the transport layer. The requirement is to enable also asynchronous communication as adapters are often needed in distributed environments with heterogeneous systems and communication protocols. The developed structures have been found suitable for communicating measurements and events in industrial process settings as shown by case examples.", keywords = "Data exchange, Industrial processes, Information models, Interoperability", author = "David H{\"a}stbacka and Petri Kannisto and Matti Vilkko", note = "Jufo_ID: 73527", year = "2018", doi = "10.5220/0006960602160222", language = "English", pages = "216--222", booktitle = "Proceedings of the 10th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 3: KMIS", publisher = "SCITEPRESS", }
@article{660ff3780336417ab86031d4206caf66, title = "Is Texture Denoising Efficiency Predictable?", abstract = "Images of different origin contain textures, and textural features in such regions are frequently employed in pattern recognition, image classification, information extraction, etc. Noise often present in analyzed images might prevent a proper solution of basic tasks in the aforementioned applications and is worth suppressing. This is not an easy task since even the most advanced denoising methods destroy texture in a more or less degree while removing noise. Thus, it is desirable to predict the filtering behavior before any denoising is applied. This paper studies the efficiency of texture image denoising for different noise intensities and several filter types under different visual quality criteria (quality metrics). It is demonstrated that the most efficient existing filters provide very similar results. From the obtained results, it is possible to generalize and employ the prediction strategy earlier proposed for denoising techniques based on the discrete cosine transform. Accuracy of such a prediction is studied and the ways to improve it are considered. Some practical recommendations concerning a decision to undertake whether it is worth applying a filter are given.", keywords = "image processing, noise suppression, Texture denoising, visual quality", author = "Oleksii Rubel and Vladimir Lukin and Sergey Abramov and Benoit Vozel and Oleksiy Pogrebnyak and Karen Egiazarian", year = "2018", doi = "10.1142/S0218001418600054", language = "English", volume = "32", journal = "International Journal of Pattern Recognition and Artificial Intelligence", issn = "0218-0014", publisher = "World Scientific Publishing", number = "1", }
@inproceedings{8567b04ab0fd485f9cefe11162f28813, title = "Making the cloud work for software producers: Linking architecture, operating cost and revenue", abstract = "Cloud migration is concerned with moving an on-premise software system into the cloud. In this paper, we focus on software producers adopting the cloud to provide their solutions to enterprise customers. Their challenge is to migrate a software product, developed in-house and traditionally delivered on-premise, to an Infrastructure-as-a-Service or Platform-as-a-Service solution, while also mapping an existing traditional licensing model on to a cloud monetization model. The analysis of relevant cost types and factors of cloud computing generate relevant information for the software producers when deciding to adopt cloud computing, and defining software pricing. We present an integrated framework for informing cloud monetization based on operational cost factors for migrating to the cloud and test it in a real-life case study. Differences between basic virtualization of the software product and using fully cloud-native platform services for re-architecting the product in question are discussed.", keywords = "Architecture migration, Cloud migration, Monetization, Software producer, Total cost of ownership", author = "Pierangelo Rosati and Frank Fowley and Claus Pahl and Davide Taibi and Theo Lynn", year = "2018", doi = "10.5220/0006679303640375", language = "English", pages = "364--375", booktitle = "CLOSER 2018 - Proceedings of the 8th International Conference on Cloud Computing and Services Science", publisher = "SCITEPRESS", }
@article{a6580d4e435e4088b42ae8f52869add5, title = "Memory Tampering Attack on Binary GCD Based Inversion Algorithms", abstract = "In the field of cryptography engineering, implementation-based attacks are a major concern due to their proven feasibility. Fault injection is one attack vector, nowadays a major research line. In this paper, we present how a memory tampering-based fault attack can be used to severely limit the output space of binary GCD based modular inversion algorithm implementations. We frame the proposed attack in the context of ECDSA showing how this approach allows recovering the private key from only one signature, independent of the key size. We analyze two memory tampering proposals, illustrating how this technique can be adapted to different implementations. Besides its application to ECDSA, it can be extended to other cryptographic schemes and countermeasures where binary GCD based modular inversion algorithms are employed. In addition, we describe how memory tampering-based fault attacks can be used to mount a previously proposed fault attack on scenarios that were initially discarded, showing the importance of including memory tampering attacks in the frameworks for analyzing fault attacks and their countermeasures.", keywords = "Binary GCD, Bitstream manipulation, ECDSA, Fault attacks, FPGA memory tampering", author = "Aldaya, {Alejandro Cabrera} and Brumley, {Billy Bob} and Sarmiento, {Alejandro J.Cabrera} and Santiago S{\'a}nchez-Solano", year = "2018", doi = "10.1007/s10766-018-0610-x", language = "English", pages = "1--20", journal = "International Journal of Parallel Programming", issn = "0885-7458", publisher = "Springer Verlag", }
@inproceedings{320b2b58a862424aae1b60e752995ebb, title = "Methods and tools for denoising of complex-valued images based on block-matching and high order singular value decomposition", abstract = "Noise suppression in complex-valued data is an important task for a wide class of applications, in particular concerning the phase retrieval in coherent imaging. The approaches based on BM3D techniques are ones of the most successful in the field. In this paper, we propose and develop a new class of BM3Dstyle algorithms, which use high order (3D and 4D) singular value decomposition (HOSVD) for transform design in complex domain. This set of the novel algorithms is implemented as a toolbox In Matlab. This development is produced for various types of the complex-domain sparsity: directly in complex domain, real/imaginary and phase/ amplitude parts of complexvalued variables. The group-wise transform design is combined with the different kinds of thresholding including multivariable Wiener filtering. The toolbox includes iterative and non-iterative novel complex-domain algorithms (filters). The efficiency of the developed algorithms is demonstrated on denoising problems with an additive Gaussian complex-valued noise. A special set of the complex-valued test-images was developed with spatially varying correlated phase and amplitudes imitating data typical for optical interferometry and holography. It is shown that for this class of the test-images the developed algorithms demonstrate the stateof- the-art performance.", keywords = "Block matching, Complex domain, Higher-order singular value decomposition, Image denoising, Phase imaging, Sparsity", author = "Mykola Ponomarenko and Vladimir Katkovnik and Karen Egiazarian", note = "jufoid=84313", year = "2018", doi = "10.2352/ISSN.2470-1173.2018.13.IPAS-306", language = "English", publisher = "Society for Imaging Science and Technology", booktitle = "Electronic Imaging", address = "United States", }
@article{b3abcf47e1bf40bd9a967d8f48b064f0, title = "Mixed-integer linear programming approach for global discrete sizing optimization of frame structures", abstract = "This paper focuses on discrete sizing optimization of frame structures using commercial profile catalogs. The optimization problem is formulated as a mixed-integer linear programming (MILP) problem by including the equations of structural analysis as constraints. The internal forces of the members are taken as continuous state variables. Binary variables are used for choosing the member profiles from a catalog. Both the displacement and stress constraints are formulated such that for each member limit values can be imposed at predefined locations along the member. A valuable feature of the formulation, lacking in most contemporary approaches, is that global optimality of the solution is guaranteed by solving the MILP using branch-and-bound techniques. The method is applied to three design problems: a portal frame, a two-story frame with three load cases and a multiple-bay multiple-story frame. Performance profiles are determined to compare the MILP reformulation method with a genetic algorithm.", keywords = "Discrete optimization, Frame structures, Global optimization, Mixed-integer linear programming, Sizing optimization", author = "{van Mellaert}, R. and K. Mela and T. Tiainen and M. Heinisuo and G. Lombaert and M. Schevenels", year = "2018", doi = "10.1007/s00158-017-1770-9", language = "English", volume = "57", pages = "579–593", journal = "Structural and Multidisciplinary Optimization", issn = "1615-147X", publisher = "Springer Verlag", number = "2", }
@inbook{7d43dc223337416d97066a705d3f91e2, title = "Modeling and estimation of signal-dependent and correlated noise", abstract = "The additive white Gaussian noise (AWGN) model is ubiquitous in signal processing. This model is often justified by central-limit theorem (CLT) arguments. However, whereas the CLT may support a Gaussian distribution for the random errors, it does not provide any justification for the assumed additivity and whiteness. As a matter of fact, data acquired in real applications can seldom be described with good approximation by the AWGN model, especially because errors are typically correlated and not additive. Failure to model accurately the noise leads to inaccurate analysis, ineffective filtering, and distortion or even failure in the estimation. This chapter provides an introduction to both signal-dependent and correlated noise and to the relevant models and basic methods for the analysis and estimation of these types of noise. Generic one-parameter families of distributions are used as the essential mathematical setting for the observed signals. The distribution families covered as leading examples include Poisson, mixed Poisson–Gaussian, various forms of signal-dependent Gaussian noise (including multiplicative families and approximations of the Poisson family), as well as doubly censored heteroskedastic Gaussian distributions. We also consider various forms of noise correlation, encompassing pixel and readout cross-talk, fixed-pattern noise, column/row noise, etc., as well as related issues like photo-response and gain nonuniformity. The introduced models and methods are applicable to several important imaging scenarios and technologies, such as raw data from digital camera sensors, various types of radiation imaging relevant to security and to biomedical imaging.", author = "Lucio Azzari and Borges, {Lucas Rodrigues} and Alessandro Foi", year = "2018", doi = "10.1007/978-3-319-96029-6_1", language = "English", isbn = "978-3-319-96028-9", series = "Advances in Computer Vision and Pattern Recognition", publisher = "SPRINGER-VERLAG LONDON LTD", pages = "1--36", booktitle = "Denoising of Photographic Images and Video", }
@article{6a71da09caf74b48acab829db137090c, title = "Multisensor Time–Frequency Signal Processing MATLAB package: An analysis tool for multichannel non-stationary data", abstract = "The Multisensor Time–FrequencySignal Processing (MTFSP) MATLAB package is an analysis tool for multichannel non-stationary signals collected from an array of sensors. By combining array signal processing for non-stationary signals and multichannel high resolution time–frequency methods, MTFSP enables applications such as cross-channel causality relationships, automated component separation and direction of arrival estimation, using multisensor time–frequency distributions (MTFDs). MTFSP can address old and new applications such as: abnormality detection in biomedical signals, source localization in wireless communications or condition monitoring and fault detection in industrial plants. It allows e.g. the reproduction of the results presented in Boashash and A{\"i}ssa-El-Bey (in press) [2].", keywords = "Automated component separation, Blind source separation, Cross-channel causality analysis, Direction of arrival, Multisensor time–frequency analysis, Non-stationary array processing", author = "Boualem Boashash and Abdeldjalil A{\"i}ssa-El-Bey and Al-Sa'd, {Mohammad F.}", year = "2018", doi = "10.1016/j.softx.2017.12.002", language = "English", volume = "8", pages = "53--58", journal = "SoftwareX", issn = "2352-7110", }
@article{9cb1ca7270644eee998aafd677048836, title = "Multi-view predictive latent space learning", abstract = "In unsupervised circumstances, multi-view learning seeks a shared latent representation by taking the consensus and complementary principles into account. However, most existing multi-view unsupervised learning approaches do not explicitly lay stress on the predictability of the latent space. In this paper, we propose a novel multi-view predictive latent space learning (MVP) model and apply it to multi-view clustering and unsupervised dimension reduction. The latent space is forced to be predictive by maximizing the correlation between the latent space and feature space of each view. By learning a multi-view graph with adaptive view-weight learning, MVP effectively combines the complementary information from multi-view data. Experimental results on benchmark datasets show that MVP outperforms the state-of-the-art multi-view clustering and unsupervised dimension reduction algorithms.", keywords = "Multi-view learning, Predictive latent space learning, Unsupervised clustering, Unsupervised dimension reduction", author = "Jirui Yuan and Ke Gao and Pengfei Zhu and Karen Egiazarian", year = "2018", doi = "10.1016/j.patrec.2018.06.022", language = "English", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{b9a9c785b55a476fb55b50701412a37f, title = "On the degeneracy of the Randić entropy and related graph measures", abstract = "Numerous quantitative graph measures have been defined and applied in various disciplines. Such measures may be differentiated according to whether they are information-theoretic or non-information-theoretic. In this paper, we examine an important property of Randić entropy, an information-theoretic measure, and examine some related graph measures based on random roots. In particular, we investigate the degeneracy of these structural graph measures and discuss numerical results. Finally, we draw some conclusions about the measures’ applicability to deterministic and non-deterministic networks.", keywords = "Data science, Graphs, Networks, Quantitative graph theory, Structural graph measures, Structural network analysis", author = "Matthias Dehmer and Zengqiang Chen and Abbe Mowshowitz and Herbert Jodlbauer and Frank Emmert-Streib and Yongtang Shi and Shailesh Tripathi and Chengyi Xia", note = "EXT={"}Tripathi, Shailesh{"}", year = "2018", doi = "10.1016/j.ins.2018.11.011", language = "English", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@article{10b34fd0bec74f7186966b7c67965027, title = "Probabilistic saliency estimation", abstract = "In this paper, we model the salient object detection problem under a probabilistic framework encoding the boundary connectivity saliency cue and smoothness constraints into an optimization problem. We show that this problem has a closed form global optimum solution, which estimates the salient object. We further show that along with the probabilistic framework, the proposed method also enjoys a wide range of interpretations, i.e. graph cut, diffusion maps and one-class classification. With an analysis according to these interpretations, we also find that our proposed method provides approximations to the global optimum to another criterion that integrates local/global contrast and large area saliency cues. The proposed unsupervised approach achieves mostly leading performance compared to the state-of-the-art unsupervised algorithms over a large set of salient object detection datasets including around 17k images for several evaluation metrics. Furthermore, the computational complexity of the proposed method is favorable/comparable to many state-of-the-art unsupervised techniques.", keywords = "Diffusion maps, One-class classification, Probabilistic model, Saliency, Salient object detection, Spectral graph cut", author = "Caglar Aytekin and Alexandros Iosifidis and Moncef Gabbouj", year = "2018", doi = "10.1016/j.patcog.2017.09.023", language = "English", volume = "74", pages = "359--372", journal = "Pattern Recognition", issn = "0031-3203", publisher = "ELSEVIER SCI LTD", }
@article{5b3fc76622614666b4ef35a823cb92af, title = "Reduction of variables of index generation functions using linear and quadratic transformations", abstract = "In many applications in communication, data retrieval and processing, digital system design, and related areas, incompletely specified switching (Boolean or multiple-valued) functions are encountered. A particular class of highly incompletely specified functions are the so-called index generation functions, which being defined on a small fraction of input combinations, often do not require all the variables to be represented. Reducing the variables of index generation functions is an important task, since they are used mainly in real-time applications and compactness of their representations influences performances of related systems. One approach towards reducing the number of variables in index generation functions are linear transformations meaning that initial variables are replaced by their linear combinations. A drawback is that finding an optimal transformation can be difficult. Therefore, in this paper, we first formulate the problem of finding a good linear transformation by using linear subspaces. This formulation serves as a basis to propose non-linear (polynomial) transformations to reduce the number of variables in index generation functions.", keywords = "Index generation function, Linear transformation, Non-linear transformation, Reed-Muller expression", author = "Helena Astola and Radomir Stanković and Jaakko Astola", note = "EXT={"}Stanković, Radomir{"}", year = "2018", language = "English", volume = "31", pages = "255--270", journal = "Journal of Multiple-Valued Logic and Soft Computing", issn = "1542-3980", publisher = "Old City Publishing", number = "3", }
@inproceedings{b508e2f87fb847c08dfb4bece2f59242, title = "Robust linearized combined metrics of image visual quality", abstract = "Existing full-reference metrics still do not provide a desirable degree of adequacy to a human visual perception, for evaluation of images with different types and levels of distortions. One reason for this is that it is difficult to incorporate the peculiarities of human visual system in the metrics design. In this paper, a robust approach to full-reference metrics' design is proposed, based on a combination of several existing full-reference metrics. A preliminary linearization (fitting) of the dependence of MOS with respect to the components metrics is performed in order to compensate shortcomings of each component. The proposed method is tested on several known databases, and demonstrate better performance than existing metrics.", keywords = "Combined metrics, Full-reference metrics, Image visual quality assessment, Robust metrics", author = "Oleg Ieremeiev and Vladimir Lukin and Nikolay Ponomarenko and Karen Egiazarian", note = "jufoid=84313 EXT={"}Ponomarenko, Nikolay{"} EXT={"}Lukin, Vladimir{"}", year = "2018", doi = "10.2352/ISSN.2470-1173.2018.13.IPAS-260", language = "English", publisher = "Society for Imaging Science and Technology", booktitle = "Electronic Imaging", address = "United States", }
@article{315e9af262c543abaca5e2508d115e65, title = "Time-of-Flight Range Measurement in Low-sensing Environment: Noise Analysis and Complex-domain Non-local Denoising", abstract = "In this work, we deal with the problem of denoising 3D scene range measurements acquired by Time-of-flight (ToF) range sensors and composed in the form of 2D image-like depth maps. We address the specific case of ToF low-sensing environment (LSE). Such environment is set by low-light sensing conditions, low-power hardware requirements, and low-reflectivity scenes. We demonstrate that data captured by a device in such mode can be effectively post-processed in order to reach the same measurement accuracy as if the device was working in normal operating mode. In order to achieve this, we first present an elaborated analysis of noise properties of ToF data sensed in LSE and verify the derived noise models by empirical measurements. Then, we develop a related novel non-local denoising approach working in complex domain and demonstrate its superiority against the state of the art for data acquired by an off-the-shelf ToF device.", keywords = "3D, Delays, denoising, Filtering, Harmonic analysis, low-sensing environment, Noise measurement, noise model, Noise reduction, Phase measurement, phase-wrap, range sensing, Sensors, Time-of-Flight (ToF)", author = "Mihail Georgiev and Robert Bregovic and Atanas Gotchev", year = "2018", doi = "10.1109/TIP.2018.2807126", language = "English", volume = "27", journal = "IEEE Transactions on Image Processing", issn = "1057-7149", publisher = "Institute of Electrical and Electronics Engineers", number = "6", }
@article{e847ccc14cdd4d08bbfd7c1aee43264d, title = "How developers perceive smells in source code: A replicated study", abstract = "Context. In recent years, smells, also referred to as bad smells, have gained popularity among developers. However, it is still not clear how harmful they are perceived from the developers’ point of view. Many developers talk about them, but only few know what they really are, and even fewer really take care of them in their source code. Objective. The goal of this work is to understand the perceived criticality of code smells both in theory, when reading their description, and in practice. Method. We executed an empirical study as a differentiated external replication of two previous studies. The studies were conducted as surveys involving only highly experienced developers (63 in the first study and 41 in the second one). First the perceived criticality was analyzed by proposing the description of the smells, then different pieces of code infected by the smells were proposed, and finally their ability to identify the smells in the analyzed code was tested. Results. According to our knowledge, this is the largest study so far investigating the perception of code smells with professional software developers. The results show that developers are very concerned about code smells in theory, nearly always considering them as harmful or very harmful (17 out of 23 smells). However, when they were asked to analyze an infected piece of code, only few infected classes were considered harmful and even fewer were considered harmful because of the smell. Conclusions. The results confirm our initial hypotheses that code smells are perceived as more critical in theory but not as critical in practice.", keywords = "Antipatterns, Bad smells, Code smells, Refactoring, Software maintenance", author = "Davide Taibi and Andrea Janes and Valentina Lenarduzzi", year = "2017", month = "12", day = "1", doi = "10.1016/j.infsof.2017.08.008", language = "English", volume = "92", pages = "223--235", journal = "Information and Software Technology", issn = "0950-5849", publisher = "Elsevier", }
@article{39f4f39daae54390bcf2798421431b04, title = "Multilinear class-specific discriminant analysis", abstract = "There has been a great effort to transfer linear discriminant techniques that operate on vector data to high-order data, generally referred to as Multilinear Discriminant Analysis (MDA) techniques. Many existing works focus on maximizing the inter-class variances to intra-class variances defined on tensor data representations. However, there has not been any attempt to employ class-specific discrimination criteria for the tensor data. In this paper, we propose a multilinear subspace learning technique suitable for applications requiring class-specific tensor models. The method maximizes the discrimination of each individual class in the feature space while retains the spatial structure of the input. We evaluate the efficiency of the proposed method on two problems, i.e. facial image analysis and stock price prediction based on limit order book data.", keywords = "Class-specific discriminant learning, Face verification, Multilinear discriminant analysis, Stock price prediction", author = "{Thanh Tran}, Dat and Moncef Gabbouj and Alexandros Iosifidis", note = "INT=sgn,{"}Thanh Tran, Dat{"}", year = "2017", month = "12", day = "1", doi = "10.1016/j.patrec.2017.10.027", language = "English", volume = "100", pages = "131--136", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{1e0ea359407f42a09f4b975bcccc9f80, title = "Quantitative Graph Theory: A new branch of graph theory and network science", abstract = "In this paper, we describe some highlights of the new branch QUANTITATIVE GRAPH THEORY and explain its significant different features compared to classical graph theory. The main goal of quantitative graph theory is the structural quantification of information contained in complex networks by employing a measurement approach based on numerical invariants and comparisons. Furthermore, the methods as well as the networks do not need to be deterministic but can be statistic. As such this complements the field of classical graph theory, which is descriptive and deterministic in nature. We provide examples of how quantitative graph theory can be used for novel applications in the context of the overarching concept network science.", keywords = "Data Science, Graphs, Networks, Quantitative Graph Theory, Statistics", author = "Matthias Dehmer and Frank Emmert-Streib and Yongtang Shi", year = "2017", month = "12", day = "1", doi = "10.1016/j.ins.2017.08.009", language = "English", volume = "418-419", pages = "575--580", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@article{c6637d59980f472a855441008c88fcb9, title = "Sparse approximations in complex domain based on BM3D modeling", abstract = "In this paper the concept of sparsity for complex-valued variables is introduced in the following three types: directly in complex domain and for two real-valued pairs phase/amplitude and real/imaginary parts of complex variables. The nonlocal block-matching technique is used for sparsity implementation and filter design for each type of sparsity. These filters are complex domain generalizations of the Block Matching 3D collaborative (BM3D) filter based on the high-order singular value decomposition (HOSVD) in order to generate group-wise adaptive analysis/synthesis transforms. Complex domain denoising is developed and studied as a test-problem for comparison of the designed filters as well as the different types of sparsity modeling.", keywords = "Block matching, Complex domain, Denoising, Elsevier article, Phase imaging, Sample document, Sparsity", author = "Vladimir Katkovnik and Mykola Ponomarenko and Karen Egiazarian", year = "2017", month = "12", day = "1", doi = "10.1016/j.sigpro.2017.05.032", language = "English", volume = "141", pages = "96--108", journal = "Signal Processing", issn = "0165-1684", publisher = "Elsevier", }
@inproceedings{b7cee803d39747419863714e9db70ecf, title = "Multi-factor authentication for wearables: Configuring system parameters with risk function", abstract = "The users of today are already about to enter the era of highly integrated modern wearable devices-the time when smart accessorieswill, in turn, push aside regular Smartphones and Tablets bringinga variety of new security challenges. The number of simultaneously used bio-sensors, both integrated into smart wearables andconnected over wireless interfaces, allows novel opportunities forMulti-factor Authentication (MFA) of the user. flis manuscriptproposes a solution for conflguring the MFA based on the averagedirect and indirect losses risk analysis. the example applicationof Bayesian function for MFA presents the applicability of the proposed framework for the utilization with wearables.", keywords = "Information security, Multi-factor authentication, Risk function, Wearables", author = "Sergey Bezzateev and Aleksandra Afanasyeva and Natalia Voloshina and Aleksandr Ometov", year = "2017", month = "11", day = "13", doi = "10.1145/3231830.3231834", language = "English", booktitle = "Proceedings of the 2nd International Conference on Advanced Wireless Information, Data, and Communication Technologies, AWICT 2017", publisher = "ACM", }
@article{fb92af94c8774d528be544c21b6faf37, title = "Big Media Data Analysis", abstract = "In this editorial a short introduction to the special issue on Big Media Data Analysis is given. The scope of this Editorial is to briefly present methodologies, tasks and applications of big media data analysis and to introduce the papers of the special issue. The special issue includes six papers that span various media analysis application areas like generic image description, medical image and video analysis, distance calculation acceleration and data collection.", keywords = "Big Media Data, Data analytics, Deep learning, Machine learning, Statistical learning", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas and Moncef Gabbouj", note = "EXT={"}Tefas, Anastasios{"}", year = "2017", month = "11", day = "1", doi = "10.1016/j.image.2017.10.004", language = "English", volume = "59", pages = "105--108", journal = "Signal Processing: Image Communication", issn = "0923-5965", publisher = "Elsevier", }
@article{52deda0b10ff4dbd9c429356c028ad38, title = "Gamified crowdsourcing: Conceptualization, literature review, and future agenda", abstract = "Two parallel phenomena are gaining attention in human–computer interaction research: gamification and crowdsourcing. Because crowdsourcing's success depends on a mass of motivated crowdsourcees, crowdsourcing platforms have increasingly been imbued with motivational design features borrowed from games; a practice often called gamification. While the body of literature and knowledge of the phenomenon have begun to accumulate, we still lack a comprehensive and systematic understanding of conceptual foundations, knowledge of how gamification is used in crowdsourcing, and whether it is effective. We first provide a conceptual framework for gamified crowdsourcing systems in order to understand and conceptualize the key aspects of the phenomenon. The paper's main contributions are derived through a systematic literature review that investigates how gamification has been examined in different types of crowdsourcing in a variety of domains. This meticulous mapping, which focuses on all aspects in our framework, enables us to infer what kinds of gamification efforts are effective in different crowdsourcing approaches as well as to point to a number of research gaps and lay out future research directions for gamified crowdsourcing systems. Overall, the results indicate that gamification has been an effective approach for increasing crowdsourcing participation and the quality of the crowdsourced work; however, differences exist between different types of crowdsourcing: the research conducted in the context of crowdsourcing of homogenous tasks has most commonly used simple gamification implementations, such as points and leaderboards, whereas crowdsourcing implementations that seek diverse and creative contributions employ gamification with a richer set of mechanics.", keywords = "Crowdsourcing, Gamification, Human computation, Literature review, Persuasive technology, Research agenda", author = "Benedikt Morschheuser and Juho Hamari and Jonna Koivisto and Alexander Maedche", year = "2017", month = "10", day = "1", doi = "10.1016/j.ijhcs.2017.04.005", language = "English", volume = "106", pages = "26--43", journal = "International Journal of Human-Computer Studies", issn = "1071-5819", publisher = "Elsevier", }
@article{60b5a181fa4e4f5d94e2f04ac0c72c10, title = "Highly unique network descriptors based on the roots of the permanental polynomial", abstract = "In this paper, we examine the zeros of permanental polynomials as highly unique network descriptors. We employ exhaustively generated networks and demonstrate that our defined graph measures based on the moduli of the zeros of permanental polynomials are quite efficient when distinguishing graphs structurally. In this work, we continue with a line of research that relates to the search of almost complete graph invariants. These highly unique network measures may serve as a powerful tool for tackling graph isomorphism.", keywords = "Data science, Graphs, Networks, Quantitative graph theory, Statistics", author = "Matthias Dehmer and Frank Emmert-Streib and Bo Hu and Yongtang Shi and Monica Stefu and Shailesh Tripathi", year = "2017", month = "10", day = "1", doi = "10.1016/j.ins.2017.04.041", language = "English", volume = "408", pages = "176--181", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@inproceedings{fd3df8a2eaef49ee9774ac7c0a8602a1, title = "Predicting academic success based on learning material usage", abstract = "In this work, we explore students' usage of online learning material as a predictor of academic success. In the context of an introductory programming course, we recorded the amount of time that each element such as a text paragraph or an image was visible on the students' screen. Then, we applied machine learning methods to study to what extent material usage predicts course outcomes. Our results show that the time spent with each paragraph of the online learning material is a moderate predictor of student success even when corrected for student time-on-task, and that the information can be used to identify at-risk students. The predictive performance of the models is dependent on the quantity of data, and the predictions become more accurate as the course progresses. In a broader context, our results indicate that course material usage can be used to predict academic success, and that such data can be collected in-situ with minimal interference to the students' learning process.", keywords = "Academic success prediction, Educational data mining, Element-level web logs, Online learning materials, Web log mining", author = "Leo Lepp{\"a}nen and Juho Leinonen and Petri Ihantola and Arto Hellas", year = "2017", month = "9", day = "27", doi = "10.1145/3125659.3125695", language = "English", pages = "13--18", booktitle = "SIGITE 2017 - Proceedings of the 18th Annual Conference on Information Technology Education", publisher = "ACM", }
@article{6a99b731b76843a78660558abfd6efe5, title = "Architecting liquid software", abstract = "The Liquid Software metaphor refers to software that can operate seamlessly across multiple devices owned by one or multiple users. Liquid Software applications can take advantage of the computing, storage and communication resources available on all the devices owned by the user. Liquid Software applications can also dynamically migrate from one device to another, following the user’s attention and usage context. The key design goal in Liquid Software development is to minimize the additional efforts arising from multiple device ownership (e.g., installation, synchronization and general maintenance of personal computers, smartphones, tablets, home and car displays, and wearable devices), while keeping the users in full control of their devices, applications and data. In this paper we present the design space for Liquid Software, categorizing and discussing the most important architectural dimensions and technical choices. We also provide an introduction and comparison of two frameworks implementing Liquid Software capabilities in the context of the World Wide Web.", keywords = "Design space, Liquid software, Multi-device programming, Multiple device ownership, Software architecture", author = "Andrea Gallidabino and Cesare Pautasso and Tommi Mikkonen and Kari Syst{\"a} and Jari-Pekka Voutilainen and Antero Taivalsaari", note = "EXT={"}Mikkonen, Tommi{"} EXT={"}Taivalsaari, Antero{"}", year = "2017", month = "9", day = "1", doi = "10.26421/JWE16.5-6", language = "English", volume = "16", pages = "433--470", journal = "Journal of Web Engineering", issn = "1540-9589", publisher = "Rinton Press Inc.", number = "5-6", }
@inproceedings{dedc29979f0549ff97d7e32330e6f3ad, title = "Comparison of time metrics in programming", abstract = "Research on the indicators of student performance in introductory programming courses has traditionally focused on individual metrics and specific behaviors. These metrics include the amount of time and the quantity of steps such as code compilations, the number of completed assignments, and metrics that one cannot acquire from a programming environment. However, the differences in the predictive powers of different metrics and the cross-metric correlations are unclear, and thus there is no generally preferred metric of choice for examining time on task or effort in programming. In this work, we contribute to the stream of research on student time on task indicators through the analysis of a multi-source dataset that contains information about students' use of a programming environment, their use of the learning material as well as self-reported data on the amount of time that the students invested in the course and per-Assignment perceptions on workload, educational value and difficulty. We compare and contrast metrics from the dataset with course performance. Our results indicate that traditionally used metrics from the same data source tend to form clusters that are highly correlated with each other, but correlate poorly with metrics from other data sources. Thus, researchers should utilize multiple data sources to gain a more accurate picture of students' learning.", author = "Juho Leinonen and Leo Lepp{\"a}nen and Petri Ihantola and Arto Hellas", year = "2017", month = "8", day = "14", doi = "10.1145/3105726.3106181", language = "English", pages = "200--208", booktitle = "ICER 2017 - Proceedings of the 2017 ACM Conference on International Computing Education Research", publisher = "ACM", }
@article{1ca4aba674c14b68a73ad6d19a2a82d4, title = "Hardware design methodology using lightweight dataflow and its integration with low power techniques", abstract = "Dataflow models of computation are capable of providing high-level descriptions for hardware and software components and systems, facilitating efficient processes for system-level design. The modularity and parallelism of dataflow representations make them suitable for key aspects of design exploration and optimization, such as efficient scheduling, task synchronization, memory and power management. The lightweight dataflow (LWDF) programming methodology provides an abstract programming model that supports dataflow-based design of signal processing hardware and software components and systems. Due to its formulation in terms of abstract application programming interfaces, the LWDF methodology can be integrated with a wide variety of simulation- and implementation-oriented languages, and can be targeted across different platforms, which allows engineers to integrate dataflow modeling approaches relatively easily into existing design processes. Previous work on LWDF techniques has emphasized their application to DSP software implementation (e.g., through integration with C and CUDA). In this paper, we efficiently integrate the LWDF methodology with hardware description languages (HDLs), and we apply this HDL-integrated form of the methodology to develop efficient methods for low power DSP hardware implementation. The effectiveness of the proposed LWDF-based hardware design methodology is demonstrated through a case study of a deep neural network application for vehicle classification.", keywords = "Clock gating, Dataflow, Deep neural networks, Digital systems design, Globally asynchronous locally synchronous, Low power design, Signal processing", author = "Tiziana Fanni and Lin Li and Timo Viitanen and Carlo Sau and Renjie Xie and Francesca Palumbo and Luigi Raffo and Heikki Huttunen and Jarmo Takala and Bhattacharyya, {Shuvra S.}", note = "INT=tie,{"}Xie, Renjie{"}", year = "2017", month = "8", day = "1", doi = "10.1016/j.sysarc.2017.06.003", language = "English", volume = "78", pages = "15--29", journal = "Journal of Systems Architecture", issn = "1383-7621", publisher = "Elsevier", }
@inproceedings{dac6ad30cbed491db379882bb5fd5c42, title = "Multi-robot active information gathering with periodic communication", abstract = "A team of robots sharing a common goal can benefit from coordination of the activities of team members, helping the team to reach the goal more reliably or quickly. We address the problem of coordinating the actions of a team of robots with periodic communication capability executing an information gathering task. We cast the problem as a multi-agent optimal decision-making problem with an information theoretic objective function. We show that appropriate techniques for solving decentralized partially observable Markov decision processes (Dec-POMDPs) are applicable in such information gathering problems. We quantify the usefulness of coordinated information gathering through simulation studies, and demonstrate the feasibility of the method in a real-world target tracking domain.", author = "Mikko Lauri and Eero Hein{\"a}nen and Simone Frintrop", note = "EXT={"}Lauri, Mikko{"}", year = "2017", month = "7", day = "21", doi = "10.1109/ICRA.2017.7989104", language = "English", pages = "851--856", booktitle = "ICRA 2017 - IEEE International Conference on Robotics and Automation", publisher = "IEEE", }
@inproceedings{9363b7ce82c44782b0e7d07341db8079, title = "Robustifying correspondence based 6D object pose estimation", abstract = "We propose two methods to robustify point correspondence based 6D object pose estimation. The first method, curvature filtering, is based on the assumption that low curvature regions provide false matches, and removing points in these regions improves robustness. The second method, region pruning, is more general by making no assumptions about local surface properties. Our region pruning segments a model point cloud into cluster regions and searches good region combinations using a validation set. The robustifying methods are general and can be used with any correspondence based method. For the experiments, we evaluated three correspondence selection methods, Geometric Consistency (GC) [1], Hough Grouping (HG) [2] and Search of Inliers (SI) [3] and report systematic improvements for their robustified versions with two distinct datasets.", author = "Antti Hietanen and Jussi Halme and Buch, {Anders Glent} and Jyrki Latokartano and J.-K. Kamarainen", year = "2017", month = "7", day = "21", doi = "10.1109/ICRA.2017.7989091", language = "English", pages = "739--745", booktitle = "ICRA 2017 - IEEE International Conference on Robotics and Automation", publisher = "IEEE", }
@inproceedings{e1042134958b49c2accb7ba9d96866d0, title = "A convolutional neural network approach for acoustic scene classification", abstract = "This paper presents a novel application of convolutional neural networks (CNNs) for the task of acoustic scene classification (ASC). We here propose the use of a CNN trained to classify short sequences of audio, represented by their log-mel spectrogram. We also introduce a training method that can be used under particular circumstances in order to make full use of small datasets. The proposed system is tested and evaluated on three different ASC datasets and compared to other state-of-the-art systems which competed in the 'Detection and Classification of Acoustic Scenes and Events' (DCASE) challenges held in 20161 and 2013. The best accuracy scores obtained by our system on the DCASE 2016 datasets are 79.0{\%} (development) and 86.2{\%} (evaluation), which constitute a 6.4{\%} and 9{\%} improvements with respect to the baseline system. Finally, when tested on the DCASE 2013 evaluation dataset, the proposed system manages to reach a 77.0{\%} accuracy, improving by 1{\%} the challenge winner's score.", author = "Michele Valenti and Stefano Squartini and Aleksandr Diment and Giambattista Parascandolo and Tuomas Virtanen", note = "jufoid=58177", year = "2017", month = "6", day = "30", doi = "10.1109/IJCNN.2017.7966035", language = "English", publisher = "IEEE", pages = "1547--1554", booktitle = "2017 International Joint Conference on Neural Networks, IJCNN 2017", }
@inproceedings{9aa1f8ae9e6c4901ac5df7752b1dbc9b, title = "Analyzing Forty years of software maintenance models", abstract = "Software maintenance has dramatically evolved in the last four decades, to cope with the continuously changing software development models, and programming languages and adopting increasingly advanced prediction models. In this work, we present the initial results of a Systematic Literature Review (SLR), highlighting the evolution of the metrics and models adopted in the last forty years.", keywords = "Software Maintenance, Systematic Literature Review", author = "Valentina Lenarduzzi and Alberto Sillitti and Davide Taibi", year = "2017", month = "6", day = "30", doi = "10.1109/ICSE-C.2017.122", language = "English", booktitle = "Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering Companion, ICSE-C 2017", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{0890b167f97f4322ad67fe48ae400190, title = "Class-specific kernel discriminant analysis based on Cholesky decomposition", abstract = "In this paper we describe a method for nonlinear class-specific discriminant learning that is based on Cholesky Decomposition. We show that the optimization problem solved in Class-Specific Kernel Discriminant Analysis is equivalent to that of Low-Rank Kernel Regression using training data independent target vectors. This connection allows us to devise a new Class-Specific Kernel Discriminant Analysis method that can be trained by exploiting fast linear system approaches, like the Cholesky decomposition. We verify our analysis in publicly available verification problems designed for human action recognition.", author = "Alexandres Iosifidis and Moncef Gabbouj", note = "jufoid=58177", year = "2017", month = "6", day = "30", doi = "10.1109/IJCNN.2017.7965980", language = "English", publisher = "IEEE", pages = "1141--1146", booktitle = "2017 International Joint Conference on Neural Networks, IJCNN 2017", }
@inproceedings{7904769fa685420d8d92ad7a5e7172ac, title = "DevOps in regulated software development: Case medical devices", abstract = "DevOps and continuous development are getting popular in the software industry. Adopting these modern approaches in regulatory environments, such as medical device software, is not straightforward because of the demand for regulatory compliance. While DevOps relies on continuous deployment and integration, regulated environments require strict audits and approvals before releases. Therefore, the use of modern development approaches in regulatory environments is rare, as is the research on the topic. However, as software is more and more predominant in medical devices, modern software development approaches become attractive. This paper discusses the fit of DevOps for regulated medical device software development. We examine two related standards, IEC 62304 and IEC 82304-1, for obstacles and benefits of using DevOps for medical device software development. We found these standards to set obstacles for continuous delivery and integration. Respectively, development tools can help fulfilling the requirements of traceability and documentation of these standards.", keywords = "agile development, DevOps, medical software development standards, Regulated software", author = "Teemu Laukkarinen and Kati Kuusinen and Tommi Mikkonen", note = "EXT={"}Kuusinen, Kati{"}", year = "2017", month = "6", day = "30", doi = "10.1109/ICSE-NIER.2017.20", language = "English", pages = "15--18", booktitle = "Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering: New Ideas and Emerging Results Track, ICSE-NIER 2017", publisher = "IEEE", }
@inproceedings{e4f810bfde8b42c79d70de5e26344bbb, title = "Generalized model of biological neural networks: Progressive operational perceptrons", abstract = "Traditional Artificial Neural Networks (ANNs) such as Multi-Layer Perceptrons (MLPs) and Radial Basis Functions (RBFs) were designed to simulate biological neural networks; however, they are based only loosely on biology and only provide a crude model. This in turn yields well-known limitations and drawbacks on the performance and robustness. In this paper we shall address them by introducing a novel feed-forward ANN model, Generalized Operational Perceptrons (GOPs) that consist of neurons with distinct (non-)linear operators to achieve a generalized model of the biological neurons and ultimately a superior diversity. We modified the conventional back-propagation (BP) to train GOPs and furthermore, proposed Progressive Operational Perceptrons (POPs) to achieve self-organized and depth-adaptive GOPs according to the learning problem. The most crucial property of the POPs is their ability to simultaneously search for the optimal operator set and train each layer individually. The final POP is, therefore, formed layer by layer and this ability enables POPs with minimal network depth to attack the most challenging learning problems that cannot be learned by conventional ANNs even with a deeper and significantly complex configuration.", author = "Serkan Kiranyaz and Turker Ince and Alexandros Iosifidis and Moncef Gabbouj", note = "jufoid=58177 EXT={"}Kiranyaz, Serkan{"} EXT={"}Ince, Turker{"}", year = "2017", month = "6", day = "30", doi = "10.1109/IJCNN.2017.7966157", language = "English", publisher = "IEEE", pages = "2477--2485", booktitle = "2017 International Joint Conference on Neural Networks, IJCNN 2017", }
@inproceedings{5676ec12f07c40208674032839f7b11e, title = "Running software research programs: An agile approach", abstract = "Agile, lean processes have become the de-facto way to operate in the domain of software intensive products. Methodologies such as the lean startup are reshaping the way new companies and even well-established enterprises seek new opportunities in their operations. In contrast, in research, little has changed during that time - organizations that fund research still expect a solid, linear research plan. In this paper, we present an attempt to challenge this model in software research, based on 7 years of experiences in two large, national, industry-led projects that followed a more agile mindset. Furthermore, we also provide an insight to key learnings and best practices of running software research in agile fashion.", keywords = "Agile, Experimentation, Lean, Software research", author = "Janne J{\"a}rvinen and Tua Huomo and Tommi Mikkonen", year = "2017", month = "6", day = "30", doi = "10.1109/ICSE-C.2017.59", language = "English", pages = "314--316", booktitle = "Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering Companion, ICSE-C 2017", publisher = "IEEE", }
@inproceedings{475cfc7ff1104b8b9745d987bf7991b1, title = "Using and collecting fine-grained usage data to improve online learning materials", abstract = "As educators seek to create better learning materials, knowledge about how students actually use the materials is priceless. The advent of online learning materials has allowed tracking of student movement on levels not previously possible with on-paper materials: Server logs can be parsed for details on when students opened certain pages. But such data is extremely coarse and only allows for rudimentary usage analysis. How do students move within the course pages? What do they read in detail and what do they glance over? Traditionally, answering such questions has required complex setups with eye tracking labs. In this paper we investigate how fine-grained data about student movement within an online learning material can be used to improve said material in an informed fashion. Our data is collected by a JavaScript-component that tracks which elements of the online learning material are visible on the student's browser window as they study. The data is collected in situ, and no software needs to be installed on the student's computer. We further investigate how such data can be combined with data from a separate learning environment in which students work on course assignments and if the types of movements made by the students are correlated with student self-regulation metrics or course outcomes. Our results indicate that the use of rather simple and non-invasive tracking of students' movements in course materials allows material creators to quickly see major problem-areas in their materials and to highlight sections that students keep returning to. In addition, when the tracking data is combined with student course assignment data, inferring meaningful assignment-specific areas within the course material becomes possible. Finally, we determine that high-level statistics of user movements are not correlated with course outcomes or certain self-regulation related metrics.", keywords = "course material usage, e-learning, heat map, learning material evaluation, student behavior, visualization", author = "Leo Lepp{\"a}nen and Juho Leinonen and Petri Ihantola and Arto Hellas", year = "2017", month = "6", day = "29", doi = "10.1109/ICSE-SEET.2017.12", language = "English", pages = "4--12", booktitle = "Proceedings - 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering and Education Track, ICSE-SEET 2017", publisher = "IEEE", }
@inproceedings{6abc97a8c6664568bc749c33a25e9cb5, title = "Children designing videos: Tools, pedagogical models, and best practices for digital storytelling and media-making in the classroom", abstract = "Although video sharing is common among youth, schools are only beginning to apply digital videos and digital storytelling to formal learning. This paper presents pedagogical models, examples, best practices, and outcomes that illustrate how teachers and students design and use digital stories in knowledge creation in cross-cultural settings. The results are based on the empirical data and findings from several international pilot studies. On the one hand, working with digital video stories drove engagement. However, on the other hand, technical issues significantly lowered engagement. In addition, the video inquiry pedagogy supported inquiry learning. Students began to pose scientifically oriented questions and seek answers together.", keywords = "Children, Media-making, Pedagogical models, STEM, Storytelling, Video", author = "Jari Multisilta and Hannele Niemi and Eric Hamilton", year = "2017", month = "6", day = "27", doi = "10.1145/3078072.3091982", language = "English", pages = "693--696", booktitle = "IDC 2017 - Proceedings of the 2017 ACM Conference on Interaction Design and Children", publisher = "ACM", }
@inproceedings{aaa76dd6f8f9425c9fbb5aa0c5aa1713, title = "Barriers for bridging interpersonal gaps: Three inspirational design patterns for increasing collocated social interaction", abstract = "Positive face-to-face social encounters between strangers can strengthen the sense of community in modern urban environments. However, it is not always easy to initiate friendly encounters due to various inhibiting social norms. We present three inspirational design patterns for reducing inhibitions to interact with unfamiliar others. These abstractions are based on a broad design space review of concepts, encompassing examples across a range of scales, fields, media and forms. Each inspirational pattern is formulated as a response to a different challenge to initiating social interaction but all share an underlying similarity in offering varieties of barriers and filters that paradoxically also separate people. The patterns are {"}Closer Through Not Seeing{"}; {"}Closer Through Not Touching{"}; and {"}Minimize Encounter Duration{"}. We believe these patterns can support designers, in understanding, articulating, and generating approaches to creating embodied interventions and systems that enable unacquainted people to interact.", keywords = "Collocated interaction, Face-to-face interaction, Social interaction design, pattern languages, embodied interaction", author = "Robb Mitchell and Thomas Olsson", year = "2017", month = "6", day = "26", doi = "10.1145/3083671.3083697", language = "English", pages = "2--10", booktitle = "C&T 2017 - 8th International Conference on Communities and Technologies, Conference Proceedings", publisher = "ACM", }
@inproceedings{f5cee32ff6f84de399358a2329655fd6, title = "A k-nearest neighbor multilabel ranking algorithm with application to content-based image retrieval", abstract = "Multilabel ranking is an important machine learning task with many applications, such as content-based image retrieval (CBIR). However, when the number of labels is large, traditional algorithms are either infeasible or show poor performance. In this paper, we propose a simple yet effective multilabel ranking algorithm that is based on k-nearest neighbor paradigm. The proposed algorithm ranks labels according to the probabilities of the label association using the neighboring samples around a query sample. Different from traditional approaches, we take only positive samples into consideration and determine the model parameters by directly optimizing ranking loss measures. We evaluated the proposed algorithm using four popular multilabel datasets. The proposed algorithm achieves equivalent or better performance than other instance-based learning algorithms. When applied to a CBIR system with a dataset of 1 million samples and over 190 thousand labels, which is much larger than any other multilabel datasets used earlier, the proposed algorithm clearly outperforms the competing algorithms.", keywords = "Content-Based Image Retrieval, k-Nearest Neighbor, Multilabel Learning", author = "Honglei Zhang and Serkan Kiranyaz and Moncef Gabbouj", year = "2017", month = "6", day = "16", doi = "10.1109/ICASSP.2017.7952624", language = "English", publisher = "IEEE", pages = "2587--2591", booktitle = "2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2017 - Proceedings", }
@inproceedings{873e629b1e7e42a7b4621164256b4243, title = "An accumulative fusion architecture for discriminating people and vehicles using acoustic and seismic signals", abstract = "In this paper, we develop new multiclass classification algorithms for detecting people and vehicles by fusing data from a multimodal, unattended ground sensor node. The specific types of sensors that we apply in this work are acoustic and seismic sensors. We investigate two alternative approaches to multiclass classification in this context - the first is based on applying Dempster-Shafer Theory to perform score-level fusion, and the second involves the accumulation of local similarity evidences derived from a feature-level fusion model that combines both modalities. We experiment with the proposed algorithms using different datasets obtained from acoustic and seismic sensors in various outdoor environments, and evaluate the performance of the two algorithms in terms of receiver operating characteristic and classification accuracy. Our results demonstrate overall superiority of the proposed new feature-level fusion approach for multiclass discrimination among people, vehicles and noise.", keywords = "multiclass classification, Sensor fusion, target detection, tracking", author = "Kyunghun Lee and Riggan, {Benjamin S.} and Bhattacharyya, {Shuvra S.}", year = "2017", month = "6", day = "16", doi = "10.1109/ICASSP.2017.7952702", language = "English", pages = "2976--2980", booktitle = "2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2017 - Proceedings", publisher = "IEEE", }
@inproceedings{69d41c425bbf4b5ea352f28ac871a575, title = "Inband full-duplex radio access system with self-backhauling: Transmit power minimization under QOS requirements", abstract = "In this paper, a self-backhauling radio access system is studied and analyzed. In particular, we consider a scenario where a full-duplex access node is serving mobile users simultaneously in uplink and downlink, while also maintaining a wireless backhaul connection. The full-duplex capability of the access node, together with large antenna arrays, allows it to do all of this using the same center frequency. The minimum transmit powers for such a system are solved in a closed form under the condition that certain Quality of Service (QoS) requirements, defined in terms of minimum uplink and downlink data rates, are fulfilled. It is demonstrated with numerical results that, by using the derived expressions for the optimal transmit powers, the probability of fulfilling the QoS requirements is greatly increased, while simultaneously the overall transmit power usage of the system is significantly reduced when compared to a benchmark scheme.", keywords = "Full-duplex, massive MIMO, self-backhauling", author = "Dani Korpi and Taneli Riihonen and Mikko Valkama", year = "2017", month = "6", day = "16", doi = "10.1109/ICASSP.2017.7953420", language = "English", publisher = "IEEE", pages = "6558--6562", booktitle = "2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2017 - Proceedings", }
@inproceedings{81d0b6e441c34bd29935a76049042dac, title = "Reduced-complexity digital predistortion for massive MIMO", abstract = "A novel reduced-complexity digital predistortion (DPD) solution is presented in this paper. The proposed DPD can suppress the unwanted distortions due to power amplifier (PA) nonlinearity and I/Q modulator impairments in direct conversion transmitters using reduced-bandwidth filtered basis functions. Moreover, the DPD parameter estimation is based on very simple decorrelation based closed-loop processing and reduced-bandwidth observation, thus further reducing the overall complexity. The proposed DPD can be used in large array or massive MIMO systems with large number of radio transceivers and PAs, where reducing the complexity of the DPD processing is very critical.", keywords = "5G, Digital Predistortion, Direct Conversion Transmitters, I/Q imbalance, Massive MIMO, Power Amplifiers", author = "Mahmoud Abdelaziz and Lauri Anttila and Mikko Valkama", year = "2017", month = "6", day = "16", doi = "10.1109/ICASSP.2017.7953404", language = "English", publisher = "IEEE", pages = "6478--6482", booktitle = "2017 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2017 - Proceedings", }
@inproceedings{41f1f8afc09a4343a7bc0f2476073fac, title = "Comparing communication effort within the scrum, scrum with Kanban, XP, and Banana development processes", abstract = "[Context]: Communication plays an important role in any development process. However, communication overhead has been rarely compared among development processes. [Objective]: The goal of this work is to compare the communication overhead and the different channels applied in three agile processes (XP, Scrum, Scrum with Kanban) and in an unstructured process. [Method]: We designed an empirical study asking four teams to develop the same application with the four development processes, and we compare the communication overhead among them. [Results]: As expected, face-to-face communication is most frequently employed in the teams. Scrum with Kanban turned out to be the process that requires the least communication. Unexpectedly, despite requiring much more time to develop the same application, the unstructured process required comparable communication overhead (25{\%} of the total development time) as the agile processes.", keywords = "Agile processes, Case study, Communication, Empirical software engineering", author = "Davide Taibi and Valentina Lenarduzzi and Ahmad, {Muhammad Ovais} and Kari Liukkunen", year = "2017", month = "6", day = "15", doi = "10.1145/3084226.3084270", language = "English", volume = "Part F128635", pages = "258--263", booktitle = "Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, EASE 2017", publisher = "Association for Computing Machinery", }
@inproceedings{97bfad925cb845998f1a58a04466411b, title = "Operationalizing the experience factory for effort estimation in agile processes", abstract = "[Background] The effort required to systematically collect historical data is not always allocable in agile processes and historical data management is usually delegated to the developers' experience, who need to remember previous project details. However, even if well trained, developers cannot precisely remember a huge number of details, resulting in wrong decisions being made during the development process. [Aims] The goal of this paper is to operationalize the Experience Factory in an agile way, i.e., defining a strategy for collecting historical project data using an agile approach. [Method] We provide a mechanism for understanding whether a measure must be collected or not, based on the Return on Invested Time (ROIT). In order to validate this approach, we instantiated the factory with an exploratory case study, comparing four projects that did not use our approach with one project that used it after 12 weeks out of 37 and two projects that used it from the beginning. [Results] The proposed approach helps developers to constantly improve their estimation accuracy with a very positive ROIT of the collected measure. [Conclusions] From this first experience, we can conclude that the Experience Factory can be applied effectively to agile processes, supporting developers in improving their performance and reducing potential decision mistakes.", keywords = "Agile software development, Experience factory, Knowledge management", author = "D. Taibi and V. Lenarduzzi and P. Diebold and I. Lunesu", year = "2017", month = "6", day = "15", doi = "10.1145/3084226.3084240", language = "English", volume = "Part F128635", pages = "31--40", booktitle = "Proceedings of the 21st International Conference on Evaluation and Assessment in Software Engineering, EASE 2017", publisher = "Association for Computing Machinery", }
@inproceedings{b9bee0b62e25418dac014dcd325d714c, title = "Microservices in agile software development: A workshop-based study into issues, advantages, and disadvantages", abstract = "In the last years, cloud-native architectures have emerged as a target platform for the deployment of microservice architectures. The migration of existing monoliths into cloud-native applications is still in the early phase, and only few companies already started their migrations. Therefore, success and failure stories about different approaches are not available in the literature. This context connects also to the recently discussed DevOps context where development and continuous deployment are closely linked.", keywords = "Cloud software, Microservices, SOA, Software architecture", author = "Davide Taibi and Valentina Lenarduzzi and Claus Pahl and Andrea Janes", year = "2017", month = "5", day = "22", doi = "10.1145/3120459.3120483", language = "English", volume = "Part F129907", booktitle = "Proceedings of the XP2017 Scientific Workshops, XP 2017", publisher = "Association for Computing Machinery", }
@inproceedings{7cab9a70e4104698af47d1eb991d9a78, title = "Comparing the Built-In Application Architecture Models in the Web Browser", abstract = "Depending on one's viewpoint, a generic standards-compatible web browser supports three, four or five built-in application rendering and programming models. In this paper, we provide an overview of the built-in client-side web application architectures. While the dominance of the base HTML/CSS/JS technologies cannot be ignored, we foresee Web Components and WebGL gaining popularity as the world moves towards more complex and even richer web applications, including systems supporting virtual and augmented reality.", keywords = "web application architectures, Web development", author = "Antero Taivalsaari and Tommi Mikkonen and Cesare Pautasso and Kari Syst{\"a}", note = "EXT={"}Taivalsaari, Antero{"} EXT={"}Mikkonen, Tommi{"} jufoid=69204", year = "2017", month = "5", day = "16", doi = "10.1109/ICSA.2017.23", language = "English", pages = "51--54", booktitle = "2017 IEEE International Conference on Software Architecture (ICSA)", publisher = "IEEE", }
@inproceedings{08123078a1a64de989d6aa6ae5749128, title = "Effects of extrinsic noise are promoter kinetics dependent", abstract = "Studies in Escherichia coli using in vivo single-RNA detection and time-lapse confocal microscopy showed that transcription is a multiple rate-limiting steps process, in agreement with previous in vitro measurements. Here, from simulations of a stochastic model of transcription validated empirically that accounts for cell-to-cell variability in RNA polymerase (RNAP) numbers, we investigate the hypothesis that the cell-to-cell variability in RNA numbers due to RNAP variability differs with the promoter rate-limiting steps dynamics. We find that increasing the cell-to-cell variability in RNAP numbers increases the cell-to-cell diversity in RNA numbers, but the degree with which it increases is promoter kinetics dependent. Namely, promoters whose open complex formation is relatively longer lasting dampen more efficiently this noise propagation phenomenon. We conclude that cell-to-cell variability in RNA numbers due to variability in RNAP numbers is promoter-sequence dependent and, thus, evolvable.", keywords = "Extrinsic noise, Gene expression, Phenotypic diversity, Rate-limiting steps, Stochastic models, Transcription initiation", author = "Bahrudeen, {Mohamed N.M.} and Sofia Startceva and Ribeiro, {Andre S.}", year = "2017", month = "5", day = "14", doi = "10.1145/3093293.3093295", language = "English", pages = "44--47", booktitle = "Proceedings of the 2017 9th International Conference on Bioinformatics and Biomedical Technology, ICBBT 2017", publisher = "ACM", }
@inproceedings{0c96516ccbbd46d8aa66cb5a0d4bdbd3, title = "Preventing keystroke based identification in open data sets", abstract = "Large-scale courses such as Massive Online Open Courses (MOOCs) can be a great data source for researchers. Ideally, the data gathered on such courses should be openly available to all researchers. Studies could be easily replicated and novel studies on existing data could be conducted. However, very fine-grained data such as source code snapshots can contain hidden identifiers. For example, distinct typing patterns that identify individuals can be extracted from such data. Hence, simply removing explicit identifiers such as names and student numbers is not sufficient to protect the privacy of the users who have supplied the data. At the same time, removing all keystroke information would decrease the value of the shared data significantly. In this work, we study how keystroke data from a programming context could be modified to prevent keystroke latency based identification whilst still retaining information that can be used to e.g. infer programming experience. We investigate the degree of anonymization required to render identification of students based on their typing patterns unreliable. Then, we study whether the modified keystroke data can still be used to infer the programming experience of the students as a case study of whether the anonymized typing patterns have retained at least some informative value. We show that it is possible to modify data so that keystroke latency based identification is no longer accurate, but the programming experience of the students can still be inferred, i.e. the data still has value to researchers. In a broader context, our results indicate that information and anonymity are not necessarily mutually exclusive.", keywords = "Data anonymization, Data privacy, Keystroke dynamics, Programming experience inference, Source code snapshots", author = "Juho Leinonen and Petri Ihantola and Arto Hellas", year = "2017", month = "4", day = "12", doi = "10.1145/3051457.3051458", language = "English", pages = "101--109", booktitle = "L@S 2017 - Proceedings of the 4th (2017) ACM Conference on Learning at Scale", publisher = "ACM", }
@inproceedings{569f45ee84b44e6786b468ad7477becd, title = "On continuous deployment maturity in customer projects", abstract = "The practice of making new software available to end users as soon as it gets implemented is becoming commonplace. This paper investigates a set of projects and their development practices in a mid-sized Finnish software company Solita Ltd. to understand how continuous deployment practices are applied in development teams. This was done by establishing a maturity scale and using it to survey the teams. In addition, we interviewed members of selected teams to understand why a particular level of maturity is desirable for a project, and to reveal the issues that impact team's ability to improve. We found that while the team, the customer, and the product all benefit from mature development practices associated with continuous deployment, some obstacles can be solved only by changing the organizational modus operandi.", keywords = "Agile, Continuous delivery, DevOps, Lean software development, Maturity model, Systems thinking", author = "Antti Virtanen and Kati Kuusinen and Marko Lepp{\"a}nen and Antti Luoto and Terhi Kilamo and Tommi Mikkonen", note = "EXT={"}Mikkonen, Tommi{"} EXT={"}Virtanen, Antti{"} EXT={"}Kuusinen, Kati{"}", year = "2017", month = "4", day = "3", doi = "10.1145/3019612.3019777", language = "English", pages = "1205--1212", booktitle = "32nd Annual ACM Symposium on Applied Computing, SAC 2017", publisher = "ACM", }
@inproceedings{c571766199ca47c7aa51ac567aeddd05, title = "User generated soundscapes activating museum visitors", abstract = "Museums are seeking various ways to attract and engage audience. Activities like virtual museums, mobile audio guides, augmented reality as well as interactive digital stories aim to provide interactive experiences for an audience with familiarity of digital interaction. Our target is to enable visitor's role change from a passive audience to an active participator as content creator. We concentrate on audio augmentation for museum context because audio provides another perspective into the content in question. In this paper, we discuss our experiences of bringing user generated soundscapes as a part of museums' activities by developing a soundscape platform and a number of mobile applications running on it. Most of the functionality is distributed as ease of use and intuitive mobile applications, which have been evaluated in real context in two workshops. The workshops had different user groups and goals. The first one evaluated ease of use and feelings evoked of the young audiences, and the second one ease of use and acceptance of use for other museums than the Museum of Technology, which was our primary design environment. Copyright is held by the owner/author(s).", keywords = "Android, Audio Augmented Reality, Engagement, Mobile Sound mixing, Participatory design, Research-based design, Soundscape, User centered design, User generated content", author = "Kari Salo and Merja Bauters and Tommi Mikkonen", year = "2017", month = "4", day = "3", doi = "10.1145/3019612.3019691", language = "English", pages = "220--227", booktitle = "32nd Annual ACM Symposium on Applied Computing, SAC 2017", publisher = "ACM", }
@article{46fdaf8dea7a447cb0364d337bacf309, title = "A Mixed Finite Element Method to Solve the EEG Forward Problem", abstract = "Finite element methods have been shown to achieve high accuracies in numerically solving the EEG forward problem and they enable the realistic modeling of complex geometries and important conductive features such as anisotropic conductivities. To date, most of the presented approaches rely on the same underlying formulation, the continuous Galerkin (CG)-FEM. In this article, a novel approach to solve the EEG forward problem based on a mixed finite element method (Mixed-FEM) is introduced. To obtain the Mixed-FEM formulation, the electric current is introduced as an additional unknown besides the electric potential. As a consequence of this derivation, the Mixed-FEM is, by construction, current preserving, in contrast to the CG-FEM. Consequently, a higher simulation accuracy can be achieved in certain scenarios, e.g., when the diameter of thin insulating structures, such as the skull, is in the range of the mesh resolution. A theoretical derivation of the Mixed-FEM approach for EEG forward simulations is presented, and the algorithms implemented for solving the resulting equation systems are described. Subsequently, first evaluations in both sphere and realistic head models are presented, and the results are compared to previously introduced CG-FEM approaches. Additional visualizations are shown to illustrate the current preserving property of the Mixed-FEM. Based on these results, it is concluded that the newly presented Mixed-FEM can at least complement and in some scenarios even outperform the established CG-FEM approaches, which motivates a further evaluation of the Mixed-FEM for applications in bioelectromagnetism.", keywords = "EEG, forward problem, mixed finite element method, realistic head modeling, source analysis", author = "J. Vorwerk and C. Engwer and S. Pursiainen and Wolters, {C. H.}", year = "2017", month = "4", day = "1", doi = "10.1109/TMI.2016.2624634", language = "English", volume = "36", pages = "930--941", journal = "IEEE Transactions on Medical Imaging", issn = "0278-0062", publisher = "Institute of Electrical and Electronics Engineers", number = "4", }
@inproceedings{9661da0085314160acdced0a1fc7f5ce, title = "Modular audio story platform for museums", abstract = "Museums are seeking different ways to attract and engage audiences. Digital stories in various forms have been utilized as one approach to increase audience experience. This paper presents how to bring audio stories as a part of museum's activities by developing a modular audio story platform. Most of the functionality is included in Android applications, which allow visitors to attach stories with emotions to artifacts, share stories with other visitors and enrich existing stories with sounds. All the audio files, linking of the artifacts and related audio files are managed by audio digital asset management system. Our platform supports curated audio stories, but the main emphasis is in the visitors' audio stories. We differentiate from the other digital storytelling systems by attaching emotions onto the visitor stories, and combining the soundscapes and audio stories as visitor modified audio stories. Copyright is held by the owner/author(s).", keywords = "Android, Audio story, Emotions, Mobile Sound mixing, Museum, Soundscape, User generated content", author = "Kari Salo and Vallo Zinin and Merja Bauters and Tommi Mikkonen", year = "2017", month = "3", day = "7", doi = "10.1145/3030024.3040975", language = "English", pages = "113--116", booktitle = "IUI 2017 - Companion of the 22nd International Conference on Intelligent User Interfaces", publisher = "ACM", }
@inproceedings{206dd091ce4149c6a0392efede964f7a, title = "Post-deployment data: A recipe for satisfying knowledge needs in software development?", abstract = "In the field of improving software processes, one of the clear trends has been the ever tighter engagement of end users in the software development process. This is demonstrated by the shift from Agile processes to Continuous Deployment, which requires more rapid ways to validate the developed software and its value than is possible with traditional communication mechanisms and methods, such as face to face conversations with customers. While post-deployment data has been used for years as an extra data source - companies like Microsoft and Intuit have moved a few steps further from that already - we believe that there are numerous uncovered ways of taking advantage of post-deployment data in software development. In this paper, we study how automatically collected post-deployment data could be used for responding to knowledge needs of software development teams. The paper builds on data collected from a number of companies operating in Finland using a questionnaire study. The focus of questionnaire study was to approach post-deployment data - especially usage data - as means of getting information to support understanding of customer and end users.", keywords = "Agile software development, Post-deployment data, Software development, Software usage data", author = "Sampo Suonsyrj{\"a} and Laura Hokkanen and Henri Terho and Kari Syst{\"a} and Tommi Mikkonen", year = "2017", month = "1", day = "6", doi = "10.1109/IWSM-Mensura.2016.029", language = "English", pages = "139--147", booktitle = "2016 Joint Conference of the International Workshop on Software Measurement and the International Conference on Software Process and Product Measurement (IWSM-MENSURA)", publisher = "IEEE", }
@article{9e5fb7a238a6467cb0cf0e82588b01b8, title = "Stop it, and be stubborn!", abstract = "This publication discusses how automatic verification of concurrent systems can be made more efficient by focusing on always may-terminating systems. First, making a system always may-terminating is a method formeeting a modelling need that exists independently of this publication. It is illustrated that without doing so, non-progress errors may be lost. Second, state explosion is often alleviated with stubborn, ample, and persistent set methods. They use expensive cycle or terminal strong component conditions in many cases. It is proven that for many important classes of properties, if the systems are always may-terminating, then these conditions can be left out.", keywords = "Ignoring problem, Safety/progress/liveness properties, Stubborn set/ample set/persistent set/partial order methods", author = "Antti Valmari", year = "2017", month = "1", day = "1", doi = "10.1145/3012279", language = "English", volume = "16", journal = "ACM Transactions on Embedded Computing Systems", issn = "1539-9087", publisher = "Association for Computing Machinery", number = "2", }
@inproceedings{6b057563a80148e0b995a79c04418e57, title = "BM3D-HVS: Content-Adaptive denoising for improved visual quality", abstract = "We introduce a content-Adaptive approach to image denoising where the filter design is based on mean opinion scores (MOSs) from preliminary experiments with volunteers who evaluated the quality of denoised image fragments. This allows to tune the filter parameters so to improve the perceptual quality of the output image, implicitly accounting for the peculiarities of the human visual system (HVS). A modification of the BM3D image denoising filter (Dabov et al., IEEE TIP, 2007), namely BM3DHVS, is proposed based on this framework. We show that it yields a higher visual quality than the conventional BM3D. Further, we have also analyzed the MOSs against popular full-reference visual quality metrics such as SSIM (Wang et al., IEEE TIP, 2004), its extension FSIM (Zhang et al., IEEE TIP, 2011), and the noreference IL-NIQE (Zhang et al., IEEE TIP, 2015) over each image fragment. Both the Spearman and the Kendall rank order correlation show that these metrics do not correspond well to the human perception. This calls for new visual quality metrics tailored for the benchmarking and optimization of image denoising methods.", author = "Karen Egiazarian and Aram Danielyan and Nikolay Ponomarenkoa and Alessandro Foia and Oleg Ieremeiev and Vladimir Lukin", note = "EXT={"}Danielyan, Aram{"} EXT={"}Lukin, Vladimir{"} jufoid=84313", year = "2017", doi = "10.2352/ISSN.2470-1173.2017.13.DPMI-083", language = "English", series = "Electronic Imaging", pages = "48--55", booktitle = "Image Processing: Algorithms and Systems XV", }
@article{9a0ca491094e49949f7037a1135b5996, title = "Data Rate Assessment on L2–L3 CPU Bus and Bus between CPU and RAM in Modern CPUs", abstract = "In this paper, modern CPU architecture with several different cache levels is described and current CPU performance limitations such as frequency increase bounds are discussed. As changes to the currently existing architecture are usually proposed as a way of increasing CPU performance, data rates of the internal and external CPU interfaces must be known. This information would help to assess the applicability of proposed solutions and to optimize them. This paper is aimed at obtaining real values of traffic on an L2–L3 cache interface inside a CPU and a CPU–RAM bus load, as well as showing the dependences of the total traffic on the studied interfaces on the number of active cores, CPU frequency, and test type. A measurement methodology using an Intel Performance Counter Monitor is provided and the equations used to obtain data rates from the internal CPU counters are explained. Both real-life and synthetic tests are described. The dependence of total traffic on the number of active cores and the dependence of total traffic on CPU frequency are provided as plots. The dependence of total traffic on test type is provided as a bar plot for multiple CPU frequencies.", keywords = "data rate assessment, multicore CPUs, Network-on-Chip, NoC, System-on-Chip, Wireless Network- on-Chip, WNoC", author = "Komar, {M. S.}", note = "INT=elt,{"}Komar, M. S.{"}", year = "2017", doi = "10.3103/S014641161707029X", language = "English", volume = "51", pages = "701--708", journal = "Automatic Control and Computer Sciences", issn = "0146-4116", publisher = "MAIK Nauka/Interperiodica", number = "7", }
@inproceedings{7e6564d469714e289e1a5ac674b675b2, title = "From theories to game mechanics: Developing a game for training rational numbers", abstract = "The paper reports the results from an ongoing project that aims to develop an engaging and effective digital game for training conceptual rational number knowledge. The overall research approach is design science. In the paper we report the results of an iteration in which we studied how students used a Semideus School game prototype and how they experienced the core mechanics of the game. 20 fourth graders and 32 sixth graders played Semideus School game for approximately 2.5 hours. Students were allowed to freely play the game with their iPads. Playing experience was studied with a digital questionnaire that included items about flow experience (Flow Short Scale), perceived playability, and acceptance of game-based math training. Additionally, a researcher observed the playing sessions and discussed with the students about the implementation of the game. Students experienced reasonable high flow experience while playing the game. The results revealed that 4th graders would be more willing to study rational numbers with a game and they also appreciated the playability of the game more than sixth graders. Moreover, sixth graders demanded more complex game mechanics, but 4th graders were happy with the core mechanics. We redesigned the game mechanics based on the findings. The paper describes the new mechanics and the theoretical basis of the new design.", keywords = "Game design, Game mechanic, Game-based learning, Mathematics, Playing experience, Rational numbers", author = "Kristian Kiili", year = "2017", language = "English", pages = "328--334", booktitle = "Proceedings of the 11th European Conference on Games Based Learning, ECGBL 2017", publisher = "Academic Conferences and Publishing International Limited", }
@inproceedings{280e2c75d6ae4a54aacc37bb281fff91, title = "Full-reference metrics multidistortional analysis", abstract = "This paper is devoted to analysis and further improvement of full-reference metrics of image visual quality. The effectiveness of a metric is characterized by the rank correlation factors between the obtained array of mean opinion scores (MOS) and the corresponding array of given metric values. This allows to determine the correspondence of a considered metric to a human visual system (HVS). Results obtained on the database TID2013 show that Spearman correlation for the best existing metrics (PSNRHMA, FSIM, SFF, etc.) does not exceed 0.85. In this paper, extended verification tools that allow to detect the shortcomings of the metrics taking into account combined distortions is proposed. An example for further improvement of the PSNRHMA metric is presented.", keywords = "Full-reference metrics, Image visual quality assessment, Metrics analysis, Metrics verification, Multiple distortions", author = "Oleg Ieremeiev and Vladimir Lukin and Nikolay Ponomarenko and Karen Egiazarian", note = "jufoid=84313 EXT={"}Ponomarenko, Nikolay{"} EXT={"}Lukin, Vladimir{"}", year = "2017", doi = "10.2352/ISSN.2470-1173.2017.13.IPAS-202", language = "English", series = "Electronic Imaging", pages = "27--35", booktitle = "Image Processing: Algorithms and Systems XV", }
@article{037c9f8ee72c49f688625fd51965b648, title = "Method for Simulating Dose Reduction in Digital Breast Tomosynthesis", abstract = "This work proposes a new method of simulating dose reduction in digital breast tomosynthesis (DBT), starting from a clinical image acquired with a standard radiation dose. It considers both signal-dependent quantum and signal-independent electronic noise. Furthermore, the method accounts for pixel crosstalk, which causes the noise to be frequency-dependent, thus increasing the simulation accuracy. For an objective assessment, simulated and real images were compared in terms of noise standard deviation, signal-to-noise ratio (SNR) and normalized noise power spectrum (NNPS). A two-alternative forced-choice (2-AFC) study investigated the similarity between the noise strength of low-dose simulated and real images. Six experienced medical physics specialists participated on the study, with a total of 2,160 readings. Objective assessment showed no relevant trends with the simulated noise. The relative error in the standard deviation of the simulated noise was less than 2{\%} for every projection angle. The relative error of the SNR was less than 1.5{\%}, and the NNPS of the simulated images had errors less than 2.5{\%}. The 2-AFC human observer experiment yielded no statistically significant difference (p=0.84) in the perceived noise strength between simulated and real images. Furthermore, the observer study also allowed the estimation of a dose difference at which the observer perceived a just-noticeable difference (JND) in noise levels. The estimated JND value indicated that a change of 17{\%} in the current-time product was sufficient to cause a noticeable difference in noise levels. The observed high accuracy, along with the flexible calibration, make this method an attractive tool for clinical image-based simulations of dose reduction.", keywords = "Biomedical imaging, Breast, Calibration, digital breast tomosynthesis, dose reduction, Electronic noise, Estimation, Image reconstruction, quantum noise, Signal to noise ratio, Standards", author = "Borges, {Lucas R.} and Igor Guerrero and Bakic, {Predrag R.} and Alessandro Foi and Maidment, {Andrew D.A.} and Vieira, {Marcelo A.C.}", year = "2017", doi = "10.1109/TMI.2017.2715826", language = "English", volume = "36", pages = "2331--2342", journal = "IEEE Transactions on Medical Imaging", issn = "0278-0062", publisher = "Institute of Electrical and Electronics Engineers", number = "11", }
@article{28a601401a45431b84e511eaa93cc466, title = "Urban 3D segmentation and modelling from street view images and LiDAR point clouds", abstract = "3D urban maps with semantic labels and metric information are not only essential for the next generation robots such autonomous vehicles and city drones, but also help to visualize and augment local environment in mobile user applications. The machine vision challenge is to generate accurate urban maps from existing data with minimal manual annotation. In this work, we propose a novel methodology that takes GPS registered LiDAR (Light Detection And Ranging) point clouds and street view images as inputs and creates semantic labels for the 3D points clouds using a hybrid of rule-based parsing and learning-based labelling that combine point cloud and photometric features. The rule-based parsing boosts segmentation of simple and large structures such as street surfaces and building facades that span almost 75{\%} of the point cloud data. For more complex structures, such as cars, trees and pedestrians, we adopt boosted decision trees that exploit both structure (LiDAR) and photometric (street view) features. We provide qualitative examples of our methodology in 3D visualization where we construct parametric graphical models from labelled data and in 2D image segmentation where 3D labels are back projected to the street view images. In quantitative evaluation we report classification accuracy and computing times and compare results to competing methods with three popular databases: NAVTEQ True, Paris-Rue-Madame and TLS (terrestrial laser scanned) Velodyne.", keywords = "LiDAR, Point cloud, Robotics, Semantic segmentation, Street view, Urban 3D", author = "Pouria Babahajiani and Lixin Fan and Joni-Kristian K{\"a}m{\"a}r{\"a}inen and Moncef Gabbouj", note = "EXT={"}Babahajiani, Pouria{"}", year = "2017", doi = "10.1007/s00138-017-0845-3", language = "English", volume = "28", pages = "679–694", journal = "Machine Vision and Applications", issn = "0932-8092", publisher = "Springer", number = "7", }
@article{3c1f745d161d49f08ce84371f9d3fd2c, title = "Improving the delivery cycle: A multiple-case study of the toolchains in Finnish software intensive enterprises", abstract = "Context: Software companies seek to gain benefit from agile development approaches in order to meet evolving market needs without losing their innovative edge. Agile practices emphasize frequent releases with the help of an automated toolchain from code to delivery. Objective: We investigate, which tools are used in software delivery, what are the reasons omitting certain parts of the toolchain and what implications toolchains have on how rapidly software gets delivered to customers. Method: We present a multiple-case study of the toolchains currently in use in Finnish software-intensive organizations interested in improving their delivery frequency. We conducted qualitative semi-structured interviews in 18 case organizations from various software domains. The interviewees were key representatives of their organization, considering delivery activities. Results: Commodity tools, such as version control and continuous integration, were used in almost every organization. Modestly used tools, such as UI testing and performance testing, were more distinctly missing from some organizations. Uncommon tools, such as artifact repository and acceptance testing, were used only in a minority of the organizations. Tool usage is affected by the state of current workflows, manual work and relevancy of tools. Organizations whose toolchains were more automated and contained fewer manual steps were able to deploy software more rapidly. Conclusions: There is variety in the need for tool support in different development steps as there are domain-specific differences in the goals of the case organizations. Still, a well-founded toolchain supports speedy delivery of new software.", keywords = "Agile software development, Continuous delivery, Continuous deployment, Deployment pipeline, Software development tools", author = "Simo M{\"a}kinen and Marko Lepp{\"a}nen and Terhi Kilamo and Anna-Liisa Mattila and Eero Laukkanen and Max Pagels and Tomi M{\"a}nnist{\"o}", year = "2016", month = "12", day = "1", doi = "10.1016/j.infsof.2016.09.001", language = "English", volume = "80", pages = "1339--1351", journal = "Information and Software Technology", issn = "0950-5849", publisher = "Elsevier", }
@inproceedings{7569f1fb449840aab31b93cce7fa97cf, title = "Casual immersive viewing with smartphones", abstract = "In this paper, we explore how to better integrate virtual reality viewing to a smartphone. We present novel designs for casual (short-term) immersive viewing of spatial and 3D content, such as augmented and virtual reality, with smartphones. Our goal is to create a simple and low-cost casual-viewing design which could be retrofitted and eventually be embedded into smartphones, instead of using larger spatial viewing accessories. We explore different designs and implemented several prototypes. One prototype uses thin and light near-to-eye optics with a smartphone display, thus providing the user with the functionality of a large, high-resolution virtual display. Our designs also enable 3D user interfaces. Easy interaction through various gestures and other modalities is possible by using the inertial and other sensors and camera of the smartphone. Our preliminary concepts are a starting point for exploring useful constructions and designs for such usage.", keywords = "3D interaction, Augmented reality, Mobile computing, Near-to-eye display, Virtual reality", author = "Ismo Rakkolainen and Roope Raisamo and Matthew Turk and Tobias H{\"o}llerer and Karri Palovuori", note = "EXT={"}Rakkolainen, Ismo{"}", year = "2016", month = "10", day = "17", doi = "10.1145/2994310.2994314", language = "English", pages = "449--452", booktitle = "AcademicMindtrek 2016 - Proceedings of the 20th International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{453a71d80a1c42ffa9a1eb509bc48263, title = "Focusing on user experience and business models in startups: Investigation of two-dimensional value creation", abstract = "While good user experience (UX) can be seen to provide competitive advantage for the company and added value to users, resources for achieving UX may often be lacking in software startups. Furthermore, in different phases of business and product development process, concentrating on the focal things can be challenging. In this study, we investigated the factors affecting UX work in startups as well as UX goals startups set for their products. Furthermore, we reviewed the goals in terms of the Minimum Viable UX framework as well as value creation aspects. We present qualitative results of a survey study with 20 software startups as well as findings of a literature review. Our study suggests that while startups aim to provide products with good usability, the lack of a more comprehensive approach to UX can hinder their value creation; affecting both user satisfaction and business success. As a result, this may affect the successful implementation of startup's business model.", keywords = "Business model, Software, Startup, User experience, Value", author = "Laura Hokkanen and Yueqiang Xu and Kaisa V{\"a}{\"a}n{\"a}nen", year = "2016", month = "10", day = "17", doi = "10.1145/2994310.2994371", language = "English", pages = "59--67", booktitle = "AcademicMindtrek 2016 - Proceedings of the 20th International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{a597fdf4c2d446b9a8c3aa4c14bc7af4, title = "Participatory development of user experience design guidelines for a B2B company", abstract = "As business success is increasingly dependent on an organization's ability to provide a pleasant user experiences (UX) for its products, companies need to find ways to harness every employee to think about UX in their daily work. To support this goal, we present a participatory development process to create user experience design guidelines for a company developing materials-handling equipment for warehouses. The guidelines were developed to steer the work of all R&D designers and developers towards experience-driven design of the products in business-to-business context. The participatory process includes six steps: Spreading awareness of UX within the company, providing information on UX, supporting understanding of UX, co-creation of guidelines, reviewing the outcome, and implementing the guidelines. This paper concentrates on describing the first five phases. The participatory approach is applicable by other organizations to support the change towards experience-driven design. The process and outcome aims to support employees' everyday work aiming for products with pleasant UX.", keywords = "B2B, Design, Guideline, Mindset, Organizational change, Participatory Design, User experience", author = "Elina Hild{\'e}n and Heli V{\"a}{\"a}t{\"a}j{\"a} and Virpi Roto and Kero Uusitalo", note = "EXT={"}Roto, Virpi{"}", year = "2016", month = "10", day = "17", doi = "10.1145/2994310.2994355", language = "English", pages = "49--58", booktitle = "AcademicMindtrek '16 Proceedings of the 20th International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{7e9893d2acb74c22a43440cc3665db70, title = "Software visualization today - Systematic literature review", abstract = "Software visualization means visualizing various aspects and artifacts related to software. By this definition a wide range of different software engineering aspects from program comprehension to understanding software process and usage are covered. This paper presents the results of systematic literature review spanning six years of software visualization literature. The main result shows that the most studied topics in the past six years are related to software structure, behavior and evolution. Software process and usage are addressed only in few studies. In the future studying the adoption of software visualization tools in industry context would be beneficial.", keywords = "Human-centered computing, Software visualization, Systematic literature review", author = "Anna-Liisa Mattila and Petri Ihantola and Terhi Kilamo and Antti Luoto and Mikko Nurminen and Heli V{\"a}{\"a}t{\"a}j{\"a}", year = "2016", month = "10", day = "17", doi = "10.1145/2994310.2994327", language = "English", pages = "262--271", booktitle = "AcademicMindtrek 2016 - Proceedings of the 20th International Academic Mindtrek Conference", publisher = "ACM", }
@inproceedings{878f84849a5d4dd8bfb10f806b4f5ee1, title = "Temporal dimensions of affect in user experience of digital news in the field", abstract = "This paper examines temporal dimensions of affective experiences as part of user experience of digital news reading in field conditions in two case studies. The first study focused on user experience of novel browser optimized versions of news for tablet computers. The second study examined the experience of digital replicas. The participants were active readers of newspapers studied. The daily reporting of affect was done over the usage period of one week. The results of both studies showed that there are differences between positive and negative affect, in their dynamism over time and individual differences they captured. The amount of negative emotions was very low with small individual differences and it reduced over time. In contrast, positive affect indicated slightly positive user experience with larger amount of individual differences. Its main dynamism was expressed at the beginning of study.", keywords = "Authentication, Browser, Digital news, Digital replica, Emotion, Reading, Tablet, User experience", author = "Satu Jumisko-Pyykk{\"o} and Emilia Pesonen and Heli V{\"a}{\"a}t{\"a}j{\"a}", year = "2016", month = "10", day = "17", doi = "10.1145/2994310.2994370", language = "English", pages = "192--197", booktitle = "AcademicMindtrek 2016 - Proceedings of the 20th International Academic Mindtrek Conference", publisher = "ACM", }
@article{cba01dbbc756475289e9c35616145549, title = "Ensembles of dense and dense sampling descriptors for the HEp-2 cells classification problem", abstract = "The classification of Human Epithelial (HEp-2) cells images, acquired through Indirect Immunofluorescence (IIF) microscopy, is an effective method to identify staining patterns in patient sera. Indeed it can be used for diagnostic purposes, in order to reveal autoimmune diseases. However, the automated classification of IIF HEp-2 cell patterns represents a challenging task, due to the large intra-class and the small inter-class variability. Consequently, recent HEp-2 cell classification contests have greatly spurred the development of new IIF image classification systems.Here we propose an approach for the automatic classification of IIF HEp-2 cell images by fusion of several texture descriptors by ensemble of support vector machines combined by sum rule. Its effectiveness is evaluated using the HEp-2 cells dataset used for the {"}Performance Evaluation of Indirect Immunofluorescence Image Analysis Systems{"} contest, hosted by the International Conference on Pattern Recognition in 2014: the accuracy on the testing set is 79.85{\%}.The same dataset was used to test an ensemble of ternary-encoded local phase quantization descriptors, built by perturbation approaches: the accuracy on the training set is 84.16{\%}. Finally, this ensemble was validated on 14 additional datasets, obtaining the best performance on 11 datasets.Our MATLAB code is available at https://www.dei.unipd.it/node/2357.", keywords = "Bag-of-features, Ensemble, HEp-2 cell classification, Machine learning, Support vector machine, Texture descriptors", author = "Loris Nanni and Alessandra Lumini and {dos Santos}, {Florentino Luciano Caetano} and Michelangelo Paci and Jari Hyttinen", year = "2016", month = "10", day = "15", doi = "10.1016/j.patrec.2016.01.026", language = "English", volume = "82", pages = "28--35", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@inproceedings{ad328ed64b3f4368b954f86e457c08ca, title = "MVP Explained: A Systematic Mapping Study on the Definitions of Minimal Viable Product", abstract = "Context: One of the most important steps of the Lean Startupmethodology is the definition of Minimum Viable Product (MVP), needed to start the learning process by integrating the early adopters' feedbacks as soon as possible. Objective: This study aims at identifying the common definitions of MVP proposed and the key factors identified to help entrepreneurs efficiently define their MVP, reducing errors due to unconsidered unknown factors. Method: We identified the MVP definitions and key factors by means of a systematic mapping study, defining the research questions and the protocol to be used. We selected the bibliographic sources, the keywords, and the selection criteria for searching the relevant papers. Results: We found 97 articles and, through inclusion and exclusion criteria, removed 75 articles, which reduced the total to 22 at the end of the process. The results are a classification schema for characterizing the definition of Minimum Viable Product in Lean Startups and a set of common key factors identified in the MVP definitions. Conclusion: The identified key factors are related to technical characteristics of the product as well as market and customer aspects. We found a positive improvement of the state of the art of MVP and the definition of Minimum.", keywords = "Entrepreneurship, Lean Startup, Minimum Viable Product, Startup", author = "Valentina Lenarduzzi and Davide Taibi", note = "EXT={"}Lenarduzzi, Valentina{"}", year = "2016", month = "10", day = "14", doi = "10.1109/SEAA.2016.56", language = "English", pages = "112--119", booktitle = "Proceedings - 42nd Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2016", publisher = "IEEE", }
@inproceedings{ebf13291dfc342d5a327fbb7c242321a, title = "Using elicitation studies to generate collocated interaction methods", abstract = "Elicitation studies allow collecting interaction methods directly from end-users by presenting the users with the end effect of an operation and then asking them to perform the action that caused it. Applying elicitation studies in the domain of collocated interaction might enable designing more intuitive and natural group interaction methods. However, in the past elicitation studies have primarily been conducted with individual users - they have rarely been applied to groups. In this paper, we report our initial experiences in using the elicitation study methodology to generate interaction methods for groups of collocated users with wearable devices.", keywords = "Collocated interaction, Elicitation study, Guessability study, Multi-device user interfaces, Wearable devices", author = "Tero Jokela and Rezaei, {Parisa Pour} and Kaisa V{\"a}{\"a}n{\"a}nen", year = "2016", month = "9", day = "6", doi = "10.1145/2957265.2962654", language = "English", pages = "1129--1133", booktitle = "Proceedings of the 18th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, MobileHCI 2016", publisher = "ACM", }
@article{471b2555295a49dba5aaca74b98a40f5, title = "Nystr{\"o}m-based approximate kernel subspace learning", abstract = "In this paper, we describe a method for the determination of a subspace of the feature space in kernel methods, which is suited to large-scale learning problems. Linear model learning in the obtained space corresponds to a nonlinear model learning process in the input space. Since the obtained feature space is determined only by exploiting properties of the training data, this approach can be used for generic nonlinear pattern recognition. That is, nonlinear data mapping can be considered to be a pre-processing step exploiting nonlinear relationships between the training data. Linear techniques can be subsequently applied in the new feature space and, thus, they can model nonlinear properties of the problem at hand. In order to appropriately address the inherent problem of kernel learning methods related to their time and memory complexities, we follow an approximate learning approach. We show that the method can lead to considerable operation speed gains and achieve very good performance. Experimental results verify our analysis.", keywords = "Kernel methods, Nonlinear pattern recognition, Nonlinear projection trick, Nystr{\"o}m approximation", author = "Alexandros Iosifidis and Moncef Gabbouj", year = "2016", month = "9", doi = "10.1016/j.patcog.2016.03.018", language = "English", pages = "190--197", journal = "Pattern Recognition", issn = "0031-3203", publisher = "ELSEVIER SCI LTD", }
@inproceedings{cf36b70fa4934b78a163688fb93c4b06, title = "Trading exploits online: A preliminary case study", abstract = "A software defect that exposes a software system to a cyber security attack is known as a software vulnerability. A software security exploit is an engineered software solution that successfully exploits the vulnerability. Exploits are used to break into computer systems, but exploits are currently used also for security testing, security analytics, intrusion detection, consultation, and other legitimate and legal purposes. A well-established market emerged in the 2000s for software vulnerabilities. The current market segments populated by small and medium-sized companies exhibit signals that may eventually lead to a similar industrialization of software exploits. To these ends and against these industry trends, this paper observes the first online market place for trading exploits between buyers and sellers. The paper adopts three different perspectives to study the case. The paper (a) portrays the studied exploit market place against the historical background in the software security industry. A qualitative assessment is made to (b) evaluate the case against the common characteristics of traditional online market places. The qualitative observations are used in the quantitative part (c) for predicting the price of exploits with partial least squares regression. The results show that (i) the case is unique from a historical perspective, although (ii) the online market place characteristics are familiar. The regression estimates also indicate that (iii) the pricing of exploits is only partially dependent on such factors as the targeted platform, the date of disclosure of the exploited vulnerability, and the quality assurance service provided by the market place provider. The results allow to contemplate (iv) practical means for enhancing the market place.", keywords = "attack code, cyber security, e-commerce, offensive security, penetration testing, software vulnerability", author = "Jukka Ruohonen and Sami Hyrynsalmi and Ville Lepp{\"a}nen", year = "2016", month = "8", day = "23", doi = "10.1109/RCIS.2016.7549301", language = "English", booktitle = "IEEE RCIS 2016 - IEEE 10th International Conference on Research Challenges in Information Science", publisher = "IEEE COMPUTER SOCIETY PRESS", }
@article{e26474b62f564543b0f8dd0cac814c87, title = "SoftWater: Software-defined networking for next-generation underwater communication systems", abstract = "Underwater communication systems have drawn the attention of the research community in the last 15 years. This growing interest can largely be attributed to new civil and military applications enabled by large-scale networks of underwater devices (e.g., underwater static sensors, unmanned autonomous vehicles (AUVs), and autonomous robots), which can retrieve information from the aquatic and marine environment, perform in-network processing on the extracted data, and transmit the collected information to remote locations. Currently underwater communication systems are inherently hardware-based and rely on closed and inflexible architectural design. This imposes significant challenges into adopting new underwater communication and networking technologies, prevent the provision of truly-differentiated services to highly diverse underwater applications, and induce great barriers to integrate heterogeneous underwater devices. Software-defined networking (SDN), recognized as the next-generation networking paradigm, relies on the highly flexible, programmable, and virtualizable network architecture to dramatically improve network resource utilization, simplify network management, reduce operating cost, and promote innovation and evolution. In this paper, a software-defined architecture, namely SoftWater, is first introduced to facilitate the development of the next-generation underwater communication systems. More specifically, by exploiting the network function virtualization (NFV) and network virtualization concepts, SoftWater architecture can easily incorporate new underwater communication solutions, accordingly maximize the network capacity, can achieve the network robustness and energy efficiency, as well as can provide truly differentiated and scalable networking services. Consequently, the SoftWater architecture can simultaneously support a variety of different underwater applications, and can enable the interoperability of underwater devices from different manufacturers that operate on different underwater communication technologies based on acoustic, optical, or radio waves. Moreover, the essential network management tools of SoftWater are discussed, including reconfigurable multi-controller placement, hybrid in-band and out-of-band control traffic balancing, and utility-optimal network virtualization. Furthermore, the major benefits of SoftWater architecture are demonstrated by introducing software-defined underwater networking solutions, including the throughput-optimal underwater routing, SDN-enhanced fault recovery, and software-defined underwater mobility management. The research challenges to realize the SoftWater are also discussed in detail.", keywords = "SDN, Underwater communications, Virtualization", author = "Akyildiz, {Ian F.} and Pu Wang and Lin, {Shih Chun}", year = "2016", month = "8", doi = "10.1016/j.adhoc.2016.02.016", language = "English", volume = "46", journal = "Ad Hoc Networks", issn = "1570-8705", publisher = "Elsevier Science Publishers B. V.", }
@inproceedings{bc45b9bb477a460983348c8fd4a96b1b, title = "On the Architecture of Liquid Software: Technology Alternatives and Design Space", abstract = "The liquid metaphor refers to software that operates seamlessly across multiple devices owned by one or multiple users. Liquid software architectures can dynamically deploy and redeploy stateful software components and transparently adapt them to the capabilities of heterogeneous target devices. The key design goal in liquid software development is to minimize the efforts that are related to multiple device ownership (e.g., installation, synchronization and general maintenance of personal computers, smartphones, tablets, home displays, cars and wear-able devices), while keeping the users in full control of their devices, applications and data. In this paper we present a design space for liquid software, categorizing and discussing the most important architectural issues and alternatives. These alternatives represent relevant capabilities offered by emerging technologies and deployment platforms that are then positioned and compared within the design space presented in the paper.", keywords = "design space, liquid software, Multi-device programming, multiple device owner-ship, software architecture", author = "Andrea Gallidabino and Cesare Pautasso and Ville Ilvonen and Tommi Mikkonen and Kari Syst{\"a} and Jari-Pekka Voutilainen and Antero Taivalsaari", note = "EXT={"}Taivalsaari, Antero{"}", year = "2016", month = "7", day = "19", doi = "10.1109/WICSA.2016.14", language = "English", pages = "122--127", booktitle = "Proceedings - 2016 13th Working IEEE/IFIP Conference on Software Architecture, WICSA 2016", publisher = "IEEE", }
@article{43e0f1fee17a4575a493991eeb5c98af, title = "Compressive Sensing Image Restoration Using Adaptive Curvelet Thresholding and Nonlocal Sparse Regularization", abstract = "Compressive sensing (CS) is a recently emerging technique and an extensively studied problem in signal and image processing, which suggests a new framework for the simultaneous sampling and compression of sparse or compressible signals at a rate significantly below the Nyquist rate. Maybe, designing an effective regularization term reflecting the image sparse prior information plays a critical role in CS image restoration. Recently, both local smoothness and nonlocal self-similarity have led to superior sparsity prior for CS image restoration. In this paper, first, an adaptive curvelet thresholding criterion is developed, trying to adaptively remove the perturbations appeared in recovered images during CS recovery process, imposing sparsity. Furthermore, a new sparsity measure called joint adaptive sparsity regularization (JASR) is established, which enforces both local sparsity and nonlocal 3-D sparsity in transform domain, simultaneously. Then, a novel technique for high-fidelity CS image recovery via JASR is proposed - CS-JASR. To efficiently solve the proposed corresponding optimization problem, we employ the split Bregman iterations. Extensive experimental results are reported to attest the adequacy and effectiveness of the proposed method comparing with the current state-of-the-art methods in CS image restoration.", keywords = "adaptive curvelet thresholding, Compressive sensing, nonlocal self-similarity, sparse recovery", author = "Nasser Eslahi and Ali Aghagolzadeh", year = "2016", month = "7", day = "1", doi = "10.1109/TIP.2016.2562563", language = "English", volume = "25", pages = "3126--3140", journal = "IEEE Transactions on Image Processing", issn = "1057-7149", publisher = "Institute of Electrical and Electronics Engineers", number = "7", }
@inproceedings{8e6ae762197346ea9d3b23452c310661, title = "An evaluation framework for cross-platform mobile app development tools: A case analysis of adobe PhoneGap framework", abstract = "The 'App economy' is a highly lucrative and competitive market for independent software vendors as it potentially offers an easy highway to reach millions of users. However, the mobile application landscape is scattered and an application developer has to publish the software for several different platforms to be able to serve a majority of smartphone users. Therefore, a bunch of cross-development tools have been offered to simplify this workload. In this paper, we present an evaluation framework for comparing different cross-development tools. We use this framework to evaluate Adobe PhoneGap tool against native development in Android and Windows Phone platforms. The results of a case study reveal that while the cross-platform technique was easy to use, the appearance and usability of the app was mediocre at its best. The business impacts of these are also discussed.", keywords = "Cross-platform development, Hybrid mobile app, Mobile application, Multi-platform", author = "Ville Ahti and Sami Hyrynsalmi and Olli Nevalainen", year = "2016", month = "6", day = "23", doi = "10.1145/2983468.2983484", language = "English", volume = "1164", pages = "41--48", booktitle = "Computer Systems and Technologies 17th International Conference, CompSysTech 2016 - Proceedings", publisher = "Association for Computing Machinery", }
@inproceedings{39681c3b0d96475bb0e96e16da17c05e, title = "A survey on aims and environments of diversification and obfuscation in software security", abstract = "Diversification and obfuscation methods are promising approaches used tosecuresoftware and prevent malware from functioning. Diversification makes each software instance unique so that malware attacks cannot rely on the knowledge of the program's execution environment and/or internal structure anymore. We present a systematic literature review on the state of-the-art of diversification and obfuscation research aiming to improve software security between 1993 and 2014. As the result of systematic search, in the final phase, 209 related papers were included in this study. In this study we focus on two specific research questions: what are the aims of diversification and obfuscation techniques and what are the environments they are applied to. The former question includes the languages and the execution environments that can benefit from these two techniques, while the second question presents the goals of the techniques and also the type of attacks they mitigate. is held by the owner/author(s). Publication rights licensed to ACM.", keywords = "Diversification, Obfuscation, Software security, Systematic literature review (SLR)", author = "Shohreh Hosseinzadeh and Sampsa Rauti and Samuel Laur{\'e}n and M{\"a}kel{\"a}, {Jari Matti} and Johannes Holvitie and Sami Hyrynsalmi and Ville Lepp{\"a}nen", year = "2016", month = "6", day = "23", doi = "10.1145/2983468.2983479", language = "English", volume = "1164", pages = "113--120", booktitle = "Computer Systems and Technologies 17th International Conference, CompSysTech 2016 - Proceedings", publisher = "Association for Computing Machinery", }
@article{e5249ad1f4e14956be87775ad8c493c0, title = "Emotional Reactions to Point-Light Display Animations", abstract = "Emotional reactions to basic, artificial, yet carefully controllable point-light displays (PLDs) were investigated with ratings of valence, arousal, approachability and dominance. PLDs were varied by movement location (upper and lower) and intensity (10°, 20° and 30° angular change) for angular upward and downward movements. Half of participants (N =28) were told that PLDs were related to face while to other half nothing was hinted. Results showed that 20° and 30° angle lower location upward movements were rated as significantly more pleasant, relaxing and approachable than corresponding upper location downward movements. Informed participants rated 20° and 30° angle lower movements as significantly more controllable than corresponding upper movements. Results are important from many perspectives, like for understanding human perceptual mechanisms. When using PLDs only a small amount of information needs to be transmitted. This enables low bandwidth requirements. As PLD visualizations are simple, there is no need for high-definition displays.", keywords = "biological movement, emotions, face perception, information visualization, point-light displays, psychology", author = "Hanna Venesvirta and Veikko Surakka and Yulia Gizatdinova and Jani Lylykangas and Oleg Špakov and Jarmo Verho and Akos Vetek and Jukka Lekkala", year = "2016", month = "6", day = "16", doi = "10.1093/iwc/iwv028", language = "English", volume = "28", pages = "521--531", journal = "Interacting with Computers", issn = "0953-5438", publisher = "Oxford University Press", number = "4", }
@inproceedings{8f46d8cf45b54eab9988df214e1e9586, title = "Exploring the use of deprecated PHP releases in the wild internet: Still a LAMP issue?", abstract = "Many web sites utilize deprecated software products that are no longer maintained by the associated software producers. This paper explores the question of whether an existing big data collection can be used to predict the likelihood of deprecated PHP releases based on different abstract components in modern web deployment stacks. Building on web intelligence, software security, and data-based industry rationales, the question is examined by focusing on the most popular domains in the contemporary web-facing Internet. Logistic regression is used for classification. Although statistical classification performance is modest, the results indicate that deprecated PHP releases are associated with Linux and other open source software components. Geographical variation is small. Besides these results, the paper contributes to the web intelligence research by evaluating the feasibility of existing big data collections for mass-scale fingerprinting.", keywords = "Cyber security, Patching, Release engineering, Web crawling", author = "Jukka Ruohonen and Sami Hyrynsalmi and Ville Lepp{\"a}nen", year = "2016", month = "6", day = "13", doi = "10.1145/2912845.2912851", language = "English", booktitle = "6th International Conference on Web Intelligence, Mining and Semantics, WIMS 2016", publisher = "Association for Computing Machinery", }
@article{549631fa52e34125b119995b3100cb7b, title = "Fifty years of graph matching, network alignment and network comparison", abstract = "In this paper we survey methods for performing a comparative graph analysis and explain the history, foundations and differences of such techniques of the last 50 years. While surveying these methods, we introduce a novel classification scheme by distinguishing between methods for deterministic and random graphs. We believe that this scheme is useful for a better understanding of the methods, their challenges and, finally, for applying the methods efficiently in an interdisciplinary setting of data science to solve a particular problem involving comparative network analysis.", keywords = "Biological networks, Computational graph theory, Graph matching, Network comparison, Network similarity, Quantitative graph theory", author = "Frank Emmert-Streib and Matthias Dehmer and Yongtang Shi", year = "2016", month = "6", day = "10", doi = "10.1016/j.ins.2016.01.074", language = "English", volume = "346-347", pages = "180--197", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@inproceedings{a28ae4bf1e8b46e3b21f5c37741b5af0, title = "Learning movement synchronization in multi-component robotic systems", abstract = "Imitation learning of tasks in multi-component robotic systems requires capturing concurrency and synchronization requirements in addition to task structure. Learning time-critical tasks depends furthermore on the ability to model temporal elements in demonstrations. This paper proposes a modeling framework based on Petri nets capable of modeling these aspects in a programming by demonstration context. In the proposed approach, models of tasks are constructed from segmented demonstrations as task Petri nets, which can be executed as discrete controllers for reproduction. We present algorithms that automatically construct models from demonstrations, showing how elements of time-critical tasks can be mapped into task Petri net elements. The approach is validated by an experiment in which a robot plays a musical passage on a keyboard.", author = "Mohammad Thabet and Alberto Montebelli and Ville Kyrki", year = "2016", month = "6", day = "8", doi = "10.1109/ICRA.2016.7487141", language = "English", isbn = "9781467380263", publisher = "IEEE", pages = "249--256", booktitle = "2016 IEEE International Conference on Robotics and Automation (ICRA)", }
@inproceedings{132046c899df479fa0f317aa063a8439, title = "Optimizing gaze direction in a visual navigation task", abstract = "Navigation in an unknown environment consists of multiple separable subtasks, such as collecting information about the surroundings and navigating to the current goal. In the case of pure visual navigation, all these subtasks need to utilize the same vision system, and therefore a way to optimally control the direction of focus is needed. We present a case study, where we model the active sensing problem of directing the gaze of a mobile robot with three machine vision cameras as a partially observable Markov decision process (POMDP) using a mutual information (MI) based reward function. The key aspect of the solution is that the cameras are dynamically used either in monocular or stereo configuration. The benefits of using the proposed active sensing implementation are demonstrated with simulations and experiments on a real robot.", author = "Tuomas V{\"a}lim{\"a}ki and Risto Ritala", year = "2016", month = "6", day = "8", doi = "10.1109/ICRA.2016.7487276", language = "English", isbn = "9781467380263", publisher = "IEEE", pages = "1427--1432", booktitle = "2016 IEEE International Conference on Robotics and Automation (ICRA)", }
@inproceedings{30654ce50bd54778a857058c850cd877, title = "A design framework for mapping vectorized synchronous dataflow graphs onto CPU-GPU platforms", abstract = "Heterogeneous computing platforms with multicore central processing units (CPUs) and graphics processing units (GPUs) are of increasing interest to designers of embedded signal processing systems since they offer the potential for significant performance boost while maintaining the flexibility of software-based design flows. Developing optimized implementations for CPU-GPU platforms is challenging due to complex, inter-related design issues, including task scheduling, interprocessor communication, memory management, and modeling and exploitation of different forms of parallelism. In this paper, we present an automated, dataflow based, design framework called DIF-GPU for application mapping and software synthesis on heterogeneous CPU-GPU platforms. DIF-GPU is based on novel extensions to the dataflow interchange format (DIF) package, which is a software environment for developing and experimenting with dataflow-based design methods and synthesis techniques for embedded signal processing systems. DIF-GPU exploits multiple forms of parallelism by deeply incorporating efficient vectorization and scheduling techniques for synchronous dataflow specifications, and incorporating techniques for streamlining interprocessor communication. DIF-GPU also provides software synthesis capabilities to help accelerate the process of moving from high-level application models to optimized implementations.", keywords = "Dataflow, Design optimization, Heterogeneous computing, Signal processing systems, Software synthesis", author = "Shuoxin Lin and Yanzhou Liu and William Plishker and Bhattacharyya, {Shuvra S.}", year = "2016", month = "5", day = "23", doi = "10.1145/2906363.2906374", language = "English", isbn = "9781450343206", pages = "20--29", booktitle = "Proceedings of the 19th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2016", publisher = "ACM", }
@inproceedings{edc518b929904d639981e8cff22a8bd3, title = "Dynamic software updating techniques in practice and Educator's guides: A review", abstract = "Patching a program during its execution without restarting is called dynamic software updating (DSU). DSU is well acknowledged in research, but rarely applied in practice as witnessed by constant need for reboots and restarts of both applications as well as operating systems. This raises the question of how well DSU related techniques are supported in education. In this paper, we review how the major software engineering and education guides acknowledge dynamic software updating techniques. Our analysis indicates that although DSU is not explicitly mentioned in the guides, the need is already well motivated and many DSU concepts are implicitly supported. Based on this, we argue that DSU could be introduced as an optional topic in software engineering studies.", keywords = "Dynamic software updating, SEEK, Software engineering body of knowledge, Software engineering education knowledge, SWEBOK", author = "Ville Ilvonen and Petri Ihantola and Tommi Mikkonen", note = "JUFOID=67349", year = "2016", month = "5", day = "19", doi = "10.1109/CSEET.2016.16", language = "English", isbn = "978-1-5090-0765-3", publisher = "IEEE", pages = "86--90", booktitle = "2016 IEEE 29th International Conference on Software Engineering Education and Training (CSEET)", }
@inproceedings{94ba5b05191c46529ca991a01dfdd891, title = "Blind sub-Nyquist GNSS signal detection", abstract = "A satellite navigation receiver traditionally searches for positioning signals using an acquisition procedure. In situations, in which the required information is only a binary decision whether at least one positioning signal is present or absent, the procedure represents an unnecessarily complex solution. This paper presents a different approach for the binary detection problem with significantly reduced computational complexity. The approach is based on a novel decision metric which is utilized to design two binary detectors. The first detector operates under the theoretical assumption of additive white Gaussian noise and is evaluated by means of Receiver Operating Characteristics. The second one considers also additional interferences and is suitable to operate in a real environment. Its performance is verified using a signal captured by a receiver front-end.", keywords = "Global Navigation Satellite Systems, indoor/outdoor detection, signal detection", author = "Ondrej Daniel and Jussi Raasakka and Pekka Peltola and Markus Fr{\"o}hle and Alejandro Rivero-Rodriguez and Henk Wymeersch and Jari Nurmi", note = "EXT={"}Raasakka, Jussi{"} EXT={"}Peltola, Pekka{"}", year = "2016", month = "5", day = "18", doi = "10.1109/ICASSP.2016.7472944", language = "English", isbn = "9781479999880", publisher = "IEEE", pages = "6575--6579", booktitle = "2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)", }
@inproceedings{67f3e499eb94429ea9c4cef0dc1ff841, title = "On Renyi's entropy estimation with one-dimensional Gaussian kernels", abstract = "R{\'e}nyi's entropies play a significant role in many signal processing applications. Plug-in kernel density estimation methods have been employed to estimate such entropies with good results. However, they become computationally intractable in higher dimensions, because of the requirement to store intermediate probability density values for a large number of data points. We propose a method to reduce the number of the samples in a plug-in kernel density estimation method for R{\'e}nyi's entropies of real exponents and to improve the result of the standard plug-in kernel density method. To this end, we derive a univariate estimator, using an Hermite expansion of sums of Gaussian kernels and a hierarchical clustering of the samples. On simulated data from a univariate Gaussian distribution, our method performs better than a k-nearest neigbour algorithm and other kernel density estimation methods.", keywords = "Gaussian kernels, Hermite expansion, hierarchical clustering, R{\'e}nyi's entropy estimation", author = "Septimia Sarbu", year = "2016", month = "5", day = "18", doi = "10.1109/ICASSP.2016.7472510", language = "English", isbn = "9781479999880", publisher = "IEEE", pages = "4408--4412", booktitle = "2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)", }
@inproceedings{ea347d953ed44492a54a90f5339d61c7, title = "Supervised subspace learning based on deep randomized networks", abstract = "In this paper, we propose a supervised subspace learning method that exploits the rich representation power of deep feedforward networks. In order to derive a fast, yet efficient, learning scheme we employ deep randomized neural networks that have been recently shown to provide good compromise between training speed and performance. For optimally determining the learnt subspace, we formulate a regression problem where we employ target vectors designed to encode both the labeling information available for the training data and geometric properties of the training data, when represented in the feature space determined by the network's last hidden layer outputs. We experimentally show that the proposed approach is able to outperform deep randomized neural networks trained by using the standard network target vectors.", keywords = "Deep Neural Networks, Network targets calculation, Supervised Subspace Learning", author = "Alexandros Iosifidis and Moncef Gabbouj", year = "2016", month = "5", day = "18", doi = "10.1109/ICASSP.2016.7472144", language = "English", isbn = "9781479999880", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", pages = "2584--2588", booktitle = "2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)", }
@inproceedings{b1c8a9f27b054c80936ff356fbb8e15a, title = "Prototyping real-Time tracking systems on mobile devices", abstract = "In this paper, we address the design an implementation of low power embedded systems for real-Time tracking of humans and vehicles. Such systems are important in applications such as activity monitoring and border security. We motivate the utility of mobile devices in prototyping the targeted class of tracking systems, and demonstrate a dataflow-based and cross-platform design methodology that enables efficient experimentation with key aspects of our tracking system design, including real-Time operation, experimentation with advanced sensors, and streamlined management of design versions on host and mobile platforms. Our experiments demonstrate the utility of our mobile-device-Targeted design methodology in validating tracking algorithm operation; evaluating real-Time performance, energy efficiency, and accuracy of tracking system execution; and quantifying trade-offs involving use of advanced sensors, which offer improved sensing accuracy at the expense of increased cost and weight. Additionally, through application of a novel, cross-platform, model-based design approach, our design requires no change in source code when migrating from an initial, host-computer-based functional reference to a fully-functional implementation on the targeted mobile device.", keywords = "Dataflow, low power design, mobile platforms, model-based design, signal processing systems, target tracking", author = "Kyunghun Lee and Salem, {Haifa Ben} and Thyagaraju Damarla and Walter Stechele and Bhattacharyya, {Shuvra S.}", year = "2016", month = "5", day = "16", doi = "10.1145/2903150.2903471", language = "English", pages = "301--308", booktitle = "CF '16 Proceedings of the ACM International Conference on Computing Frontiers", publisher = "ACM", }
@inproceedings{c5be676e96f04a22b5b1b7bddc8f3b9c, title = "Collaboration change in enterprise software development", abstract = "Enterprise software development is a complex effort that may last years. Enterprise software is often developed by a systems integrator that makes modifications to a pre-made package or builds tailored software for the specific purpose. The development may include many developer organizations, the user organization, and their different departments and sub-units. Their collaboration evolves through project incidents, phases and even crises. The practices of project management, communication, contracts, and ultimately personal relationships change intentionally or unintentionally. These changes may cause uncertainties and discontinuities for the development. This study observes changes during enterprise software development and their influence on collaboration practices in different situations. During twenty years of development both internal and external crises and changes in the business environment triggered changes in collaboration. The collaboration practices are classified with four modes of collaboration (contract, cooperation, personified, and process) that illustrate emphasis in collaboration in different circumstances.", keywords = "Collaboration, Collaboration change, Enterprise software, Project management", author = "Kari Smolander and Matti Rossi and Samuli Pekkola", year = "2016", month = "5", day = "14", doi = "10.1145/2897586.2897590", language = "English", isbn = "9781450341554", pages = "68--74", booktitle = "Proceedings - 9th International Workshop on Cooperative and Human Aspects of Software Engineering, CHASE 2016", publisher = "ACM", }
@inproceedings{18038dc39b0d413a94bcf472598dfe9f, title = "Coordinating proactive social devices in a mobile cloud: Lessons learned and a way forward", abstract = "Recent device shipment trends strongly indicate that the number of Web-enabled devices other than PCs and smart phones are growing rapidly. Marking the end of the dominant era of these two traditional device categories, people will soon commonly use various types of Internet-connected devices in their daily lives, where no single device will dominate. Since today's devices are mostly standalone and only stay in sync in limited ways, new approaches are needed for mastering the complexity arising from the world of many types of devices, created by different manufacturers and implementing competing standards. Today, the most common denominator for dealing with the differences is using clouds. Unfortunately, however, while the cloud is well suited for numerous activities, there are also serious limitations, especially when considering systems that consist of numerous, battery-powered computing devices that have limited connectivity. In this paper, we provide an insight to our research where totally cloud-based orchestration of cooperating devices is partitioned into more local actions, where constant communication with the cloud backend can be at least partially omitted.", keywords = "Cloud computing, Cyber-physical systems, Internet of things, Mobile cloud, Multi-device ownership, Multi-device programming", author = "Niko M{\"a}kitalo and Timo Aaltonen and Tommi Mikkonen", year = "2016", month = "5", day = "14", doi = "10.1145/2897073.2897079", language = "English", pages = "179--188", booktitle = "MOBILESoft '16 Proceedings of the International Conference on Mobile Software Engineering and Systems", publisher = "ACM", }
@article{f33427dd508747f9ab42a976f927f382, title = "Exploring the role of ten universal values in using products and services", abstract = "The aim of this research was to explore the role of Schwartz's ten universal human values in the context of using products and services. Seventy-five participants were asked to qualitatively describe a product or service especially well in line with their values and a product or service in conflict with their values, and to evaluate them on a number of rating scales. The scales included 30 statements (three statements per universal value) probing the presence of each value in user experiences related to products and services and 10 statements studying the perceived importance of each value. The results showed that all the ten universal values were relevant in the evaluations of products and services both in line with the users' values and in conflict with the users' values. In the current sample, hedonism and self-direction were rated as the values most frequently present and most important in the evaluations of products and services in line with values. Power was rated as a moderately important value for products in conflict with values, but significantly less important for products in line with values. Achievement values were frequently reported in the qualitative descriptions, but they were less prominent in the quantitative data. The results suggest that the model of ten universal values is promising in understanding the role of users' value preferences in using products and services, and it seems to have potential for complementing the psychological needs approach in understanding user experience.", keywords = "empirical studies in HCI, HCI design and evaluation methods, user experience, user values, value-sensitive design", author = "Timo Partala and Sari Kujala", year = "2016", month = "5", day = "1", doi = "10.1093/iwc/iwv007", language = "English", volume = "28", pages = "311--331", journal = "Interacting with Computers", issn = "0953-5438", publisher = "Oxford University Press", number = "3", }
@inproceedings{90b5af6f06634446be08e1e7d360d9b8, title = "Learnings from the Finnish game industry", abstract = "The motivation behind our research was the rapid growth and business wins of world-class Finnish game companies, like Supercell, as well as the success of other game companies in Finland. In particular, Supercell's growth is something that has not been heard of before and this raised the interest to research what game companies have been doing right. Supercell is not the only Finnish success. Rovio is also well known and has the roots for success from few years before. There are also other game companies in Finland that have succeeded and this motivated us to investigate what is happening behind the game industry and what could be learned from there that could be applied to other software industry as well. In order to explore and explain the different success factors, we interviewed the following eight Finnish game companies: Rovio Entertainment, Fingersoft, TicBits, Boomlagoon, 10tons, Tribeflame, Star Arcade and Mountain Sheep. In addition, we investigated public sources, like interviews given to newspapers and books written about companies. These sources cover well Supercell as they have given numerous public interviews to journalists. Similarly, Remedy was analysed based on public sources. Based on the results we recognised some 30 patterns that, depending on the context, could be used in other organisations as well. The patterns include the applicable context where they can be used, driving forces (and counterforces) that should be recognised, the problem they are solving and the solution to the problem coupled with the key enablers. Furthermore, narrative stories based on the interviews and public sources are included.", author = "Marko Helenius and Petri Kettunen and Lauri Frank", note = "EXT={"}Frank, Lauri{"}", year = "2016", month = "4", day = "7", doi = "10.1145/3022636.3022648", language = "English", booktitle = "Proceedings of the 10th Travelling Conference on Pattern Languages of Programs, VikingPLoP 2016", publisher = "ACM", }
@inproceedings{7c4108807db34cfb8b92e901e6618ffd, title = "Patterns for safety system bus architecture", abstract = "Traditionally safety and controls systems have been strictly separated from each other. There are both benefits and liabilities in this approach. Thus, modern system employing control and safety system parts do not necessarily make a strict separation between these two elements of the system. Regardless of the degree of separation, the nodes belonging to either control or safety system may need to communicate with each other to implement the desired functionality. An increasing number of systems nowadays utilize a fieldbus to connect the distributed nodes of the system together. A time comes in the design process, when one needs to select the architecture of the physical fieldbus. That is, how and which nodes are connected? In this paper, two patterns to organize the fieldbus architecture are illustrated. In short, one either can separate the fieldbus between the safety and control system nodes or use a shared fieldbus between the nodes.", keywords = "Communication, Control system, Fieldbus, Safety system, Separated, Shared", author = "Jari Rauham{\"a}ki", year = "2016", month = "4", day = "7", doi = "10.1145/3022636.3022640", language = "English", booktitle = "Proceedings of the 10th Travelling Conference on Pattern Languages of Programs, VikingPLoP 2016", publisher = "ACM", }
@inproceedings{7b3361c68c4e4e9db92b7b9331658289, title = "Patterns for subsidiaries as innovation tools", abstract = "In this paper, we describe two patterns for fostering innovative ideas in a company. The patterns originate from experiences in real companies. Innovations are crucial in opening up new business vistas for a company. Old business models for any company will wither as times change and, continuous innovation is needed. However, companies are geared for efficient execution of their current business, not for fostering new ideas. One way for innovation incubation is a subsidiary. A subsidiary typically has more freedom and risk-based incentives than an internal startup. To run a successful subsidiary, one must first decide when to Spin Off, then, how to run the Subsidiary and, finally, Merge and Scale the business, if feasible.", keywords = "Innovation, Internal startup, Lean, Startups", author = "Marko Lepp{\"a}nen and Laura Hokkanen", year = "2016", month = "4", day = "7", doi = "10.1145/3022636.3022643", language = "English", booktitle = "Proceedings of the 10th Travelling Conference on Pattern Languages of Programs, VikingPLoP 2016", publisher = "ACM", }
@article{90154a67ecec44cda343ee7b7604ff9f, title = "Texture classification using dense micro-block difference", abstract = "This paper is devoted to the problem of texture classification. Motivated by recent advancements in the field of compressive sensing and keypoints descriptors, a set of novel features called dense micro-block difference (DMD) is proposed. These features provide highly descriptive representation of image patches by densely capturing the granularities at multiple scales and orientations. Unlike most of the earlier work on local features, the DMD does not involve any quantization, thus retaining the complete information. We demonstrate that the DMD have dimensionality much lower than Scale Invariant Feature Transform (SIFT) and can be computed using integral image much faster than SIFT. The proposed features are encoded using the Fisher vector method to obtain an image descriptor, which considers high-order statistics. The proposed image representation is combined with the linear support vector machine classifier. Extensive experiments are conducted on five texture data sets (KTH-TIPS, UMD, KTH-TIPS-2a, Brodatz, and Curet) using standard protocols. The results demonstrate that our approach outperforms the state-of-the-art in texture classification.", keywords = "compressive sensing, descriptors, LBP, Scale Invariant Feature Transform, SVM, Texture classification", author = "Rakesh Mehta and Karen Egiazarian", year = "2016", month = "4", day = "1", doi = "10.1109/TIP.2016.2526898", language = "English", volume = "25", pages = "1604--1616", journal = "IEEE Transactions on Image Processing", issn = "1057-7149", publisher = "Institute of Electrical and Electronics Engineers", number = "4", }
@article{35804a3c04654c01b91e73e04ff3a683, title = "Detection of bubbles as concentric circular arrangements", abstract = "The paper proposes a method for the detection of bubble-like transparent objects in a liquid. The detection problem is non-trivial since bubble appearance varies considerably due to different lighting conditions causing contrast reversal and multiple interreflections. We formulate the problem as the detection of concentric circular arrangements (CCA). The CCAs are recovered in a hypothesize-optimize-verify framework. The hypothesis generation is based on sampling from the partially linked components of the non-maximum suppressed responses of oriented ridge filters, and is followed by the CCA parameter estimation. Parameter optimization is carried out by minimizing a novel cost-function. The performance was tested on gas dispersion images of pulp suspension and oil dispersion images. The mean error of gas/oil volume estimation was used as a performance criterion due to the fact that the main goal of the applications driving the research was the bubble volume estimation. The method achieved 28 and 13 {\%} of gas and oil volume estimation errors correspondingly outperforming the OpenCV Circular Hough Transform in both cases and the WaldBoost detector in gas volume estimation.", keywords = "Bubble detection, Circular arrangements, Image processing, Machine vision, Object segmentation", author = "Nataliya Strokina and Jiri Matas and Tuomas Eerola and Lasse Lensu and Heikki K{\"a}lvi{\"a}inen", year = "2016", month = "4", doi = "10.1007/s00138-016-0749-7", language = "English", volume = "27", pages = "387--396", journal = "Machine Vision and Applications", issn = "0932-8092", publisher = "Springer", number = "3", }
@article{4c177161f77f4a7d8fae1657a8e0bcdf, title = "An Assessment of Errors and Their Reduction in Terrestrial Laser Scanner Measurements in Marmorean Surfaces", abstract = "The need for accurate documentation for the preservation of cultural heritage has prompted the use of terrestrial laser scanner (TLS) in this discipline. Its study in the heritage context has been focused on opaque surfaces with lambertian reflectance, while translucent and anisotropic materials remain a major challenge. The use of TLS for the mentioned materials is subject to significant distortion in measure due to the optical properties under the laser stimulation. The distortion makes the measurement by range not suitable for digital modelling in a wide range of cases. The purpose of this paper is to illustrate and discuss the deficiencies and their resulting errors in marmorean surfaces documentation using TLS based on time-of-flight and phase-shift. Also proposed in this paper is the reduction of error in depth measurement by adjustment of the incidence laser beam. The analysis is conducted by controlled experiments.", keywords = "Comparison, Experimental, Laser scanning, Marble, Measurement, Translucency", author = "Jorge Garcia-Fernandez", year = "2016", month = "3", day = "1", doi = "10.1007/s13319-015-0077-0", language = "English", volume = "7", pages = "1--11", journal = "3D Research", issn = "2092-6731", publisher = "Springer Verlag", number = "1", }
@inproceedings{ec12576cc34a44a7b366fb9580fa6393, title = "Increasing collocated people's awareness of the mobile user's activities: A field trial of social displays", abstract = "Many activities that have traditionally been performed with different dedicated physical artifacts are now done with personal mobile devices. Consequently, the privacy of mobile interfaces has hampered social observability and chances for serendipitous interactions. For example, reading an electronic newspaper with a mobile device does not allow the surrounding people to be similarly aware of the reader's activity as traditional newspapers. Social displays are additional displays on mobile devices providing the surrounding people with light-weight cues about the activities of the device user. We implemented a prototype that reveals the user's current active application and presents its name on an e-ink display on the backside of a mobile device. We conducted a ten-day field trial with 13 participants using the prototype. The results show that the prototype was able to increase awareness of users' mobile activities and occasionally triggered interactions with others, without significantly violating the sense of privacy.", keywords = "Activity awareness, Backside display, Collocated interaction, Face-to-face interaction, Field study, Personal interface, Social display, Social interaction, User trial", author = "Pradthana Jarusriboonchai and Aris Malapaschas and Thomas Olsson and Kaisa V{\"a}{\"a}n{\"a}nen", year = "2016", month = "2", day = "27", doi = "10.1145/2818048.2819990", language = "English", isbn = "9781450335928", pages = "1691--1702", booktitle = "CSCW '16 - Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing", publisher = "ACM", }
@inproceedings{83d58aa906154bcaa2db998ed4632ca1, title = "Social display...We can see what you are doing on your mobile device", abstract = "Mobile devices have become powerful in terms of computing and supporting various human activities. People have moved some of their activities that earlier have been done with dedicated artifacts to mobile devices. However, due to the rather private and personal interfaces of mobile devices, activities that earlier were easily observable by surrounding others have become private, decreasing the surroundings people's awareness of a mobile user's activity and thus the possibilities for serendipitous interactions. We developed a prototype called social display; it provides light-weight visual cues about mobile user's current activity with the device. The cues are displayed on a display attached to the backside of the user's mobile device. We present the concept, explain the design decisions and briefly report key findings from, first, a focus group study and, second, a field trial study.", keywords = "Activity awareness, Backside display, Collocated interaction, Face-to-face interaction, Field study, Personal interface, Social display, Social interaction, User trial", author = "Pradthana Jarusriboonchai and Aris Malapaschas and Thomas Olsson and Kaisa V{\"a}{\"a}n{\"a}nen", year = "2016", month = "2", day = "27", doi = "10.1145/2818052.2874323", language = "English", isbn = "9781450339506", pages = "53--56", booktitle = "CSCW '16 Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing", publisher = "ACM", }
@inproceedings{52dcd4ababd742bb8de5c42906d49cea, title = "Lean manufacturing methods in simulation literature: Review and association analysis", abstract = "The lean manufacturing philosophy includes several methods that aim to remove waste from production. This paper studies lean manufacturing methods and how simulation is used to consider them. In order to do this, it reviews papers that study simulation together with lean methods. The papers that are reviewed are categorized according to the lean methods used and result types obtained. Analysis is performed in order to gain knowledge about the volumes of occurrence of different methods and result types. Typical methods in the papers are different types of value stream mapping and work-in-process models. An exploratory analysis is performed to reveal the relationships between the methods and result types. This is done using association analysis. It reveals the methods that are commonly studied together in the literature. The paper also lists research areas that are not considered in the literature. These areas are often related to the analysis of variation.", author = "Henri Tokola and Esko Niemi and Ville V{\"a}ist{\"o}", note = "EXT={"}Niemi, Esko{"}", year = "2016", month = "2", day = "16", doi = "10.1109/WSC.2015.7408336", language = "English", isbn = "978-1-4673-9743-8", pages = "2239--2248", booktitle = "2015 Winter Simulation Conference (WSC)", }
@article{4756eb80db02481f9e600366f75393e4, title = "The influence of developer multi-homing on competition between software ecosystems", abstract = "Having a large number of applications in the marketplace is considered a critical success factor for software ecosystems. The number of applications has been claimed to determine which ecosystems holds the greatest competitive advantage and will eventually dominate the market. This paper investigates the influence of developer multi-homing (i.e., participating in more than one ecosystem) in three leading mobile application ecosystems. Our results show that when regarded as a whole, mobile application ecosystems are single-homing markets. The results further show that 3{\%} of all developers generate more than 80{\%} of installed applications and that multi-homing is common among these developers. Finally, we demonstrate that the most installed content actually comprises only a small number of the potential value propositions. The results thus imply that attracting and maintaining developers of superstar applications is more critical for the survival of a mobile application ecosystem than the overall number of developers and applications. Hence, the mobile ecosystem is unlikely to become a monopoly. Since exclusive contracts between application developers and mobile application ecosystems are rare, multi-homing is a viable component of risk management and a publishing strategy. The study advances the theoretical understanding of the influence of multi-homing on competition in software ecosystems.", keywords = "Multi-homing, Software ecosystem, Two-sided markets", author = "Sami Hyrynsalmi and Arho Suominen and Matti M{\"a}ntym{\"a}ki", year = "2016", month = "1", day = "1", doi = "10.1016/j.jss.2015.08.053", language = "English", volume = "111", pages = "119--127", journal = "Journal of Systems and Software", issn = "0164-1212", publisher = "Elsevier", }
@article{ab4e8914424b4f64a6ad31ba5da0ff33, title = "Analysis of a receiver-based reliable broadcast approach for vehicular networks", abstract = "The Intelligent Transportation Systems concept provides the ground to enable a wide range of applications to improve traffic safety and efficiency. Innovative communication systems must be proposed taking into account, on the one hand, unstable characteristics of vehicular communications and, on the other hand, different requirements of applications. In this paper a reliable (geo-)broadcasting scheme for vehicular ad-hoc networks is proposed and analyzed. This receiver-based technique aims at fulfilling the received message integrity yet keeping the overhead at a reasonably low level. The results are compared to simulation studies carried out in the Network Simulator-3 (NS-3) simulation environment demonstrating good agreement with each other. The analysis shows that in a single-hop scenario, receiver-based reliable broadcasting can provide good reliability, while giving very little overhead for high number of receivers.", keywords = "(Geo)Broadcast, Performance modeling, Reliability, Vehicular ad hoc networks", author = "Mozhdeh Gholibeigi and Geert Heijenk and Dmitri Moltchanov and Yevgeni Koucheryavy", year = "2016", doi = "10.1016/j.adhoc.2015.08.003", language = "English", volume = "37", pages = "63--75", journal = "Ad Hoc Networks", issn = "1570-8705", publisher = "Elsevier Science Publishers B. V.", }
@inproceedings{e982aa8beae744779d9dd2dda32bc75b, title = "Collecting usage data for software development: Selection framework for technological approaches", abstract = "Software development methods are shifting towards faster deployments and closer to the end users. Their ever tighter engagement of end-users also requires new technologies for gathering feedback from those users. At the same time, widespread Internet connectivity of different application environments is enabling the collection of this post-deployment data also from sources other than traditional web and mobile software. However, the sheer number of different alternatives of collecting technologies makes the selection a complicated process in itself. In this paper, we describe the process of data-driven software development and study the challenges organizations face when they want to start guiding their development towards it. From these challenges, we extract evaluation criteria for technological approaches to usage data collecting. We list such approaches and evaluate them using the extracted criteria. Using a design science approach, we refine the evaluation criteria to a selection framework that can help practitioners in finding a suitable technological approach for automated collecting of usage data.", author = "Sampo Suonsyrj{\"a} and Kari Syst{\"a} and Tommi Mikkonen and Henri Terho", year = "2016", doi = "10.18293/SEKE2016-186", language = "English", publisher = "Knowledge Systems Institute Graduate School", pages = "114--119", booktitle = "Proceedings - SEKE 2016: 28th International Conference on Software Engineering and Knowledge Engineering", }
@article{4a704cf2b602432495db48990622e978, title = "Comparison of Feature Selection Techniques in Machine Learning for Anatomical Brain MRI in Dementia", abstract = "We present a comparative split-half resampling analysis of various data driven feature selection and classification methods for the whole brain voxel-based classification analysis of anatomical magnetic resonance images. We compared support vector machines (SVMs), with or without filter based feature selection, several embedded feature selection methods and stability selection. While comparisons of the accuracy of various classification methods have been reported previously, the variability of the out-of-training sample classification accuracy and the set of selected features due to independent training and test sets have not been previously addressed in a brain imaging context. We studied two classification problems: 1) Alzheimer’s disease (AD) vs. normal control (NC) and 2) mild cognitive impairment (MCI) vs. NC classification. In AD vs. NC classification, the variability in the test accuracy due to the subject sample did not vary between different methods and exceeded the variability due to different classifiers. In MCI vs. NC classification, particularly with a large training set, embedded feature selection methods outperformed SVM-based ones with the difference in the test accuracy exceeding the test accuracy variability due to the subject sample. The filter and embedded methods produced divergent feature patterns for MCI vs. NC classification that suggests the utility of the embedded feature selection for this problem when linked with the good generalization performance. The stability of the feature sets was strongly correlated with the number of features selected, weakly correlated with the stability of classification accuracy, and uncorrelated with the average classification accuracy.", keywords = "Alzheimer’s Disease, Classification, Feature selection, Machine Learning, Magnetic Resonance Imaging, Multivariate pattern analysis", author = "Jussi Tohka and Elaheh Moradi and Heikki Huttunen and {Alzheimer’s Disease Neuroimaging Initiative} and {Alzheimer’s Disease Neuroimaging Initiative 2}", note = "EXT={"}Tohka, Jussi{"}", year = "2016", doi = "10.1007/s12021-015-9292-3", language = "English", volume = "14", pages = "279--296", journal = "Neuroinformatics", issn = "1539-2791", publisher = "HUMANA PRESS INC", number = "3", }
@article{0ca70b2861794549b33be91c4eb66ce9, title = "Dominant Rotated Local Binary Patterns (DRLBP) for texture classification", abstract = "In this paper, we present a novel rotation-invariant and computationally efficient texture descriptor called Dominant Rotated Local Binary Pattern (DRLBP). A rotation invariance is achieved by computing the descriptor with respect to a reference in a local neighborhood. A reference is fast to compute maintaining the computational simplicity of the Local Binary Patterns (LBP). The proposed approach not only retains the complete structural information extracted by LBP, but it also captures the complimentary information by utilizing the magnitude information, thereby achieving more discriminative power. For feature selection, we learn a dictionary of the most frequently occurring patterns from the training images, and discard redundant and non-informative features. To evaluate the performance we conduct experiments on three standard texture datasets: Outex12, Outex 10 and KTH-TIPS. The performance is compared with the state-of-the-art rotation invariant texture descriptors and results show that the proposed method is superior to other approaches.", keywords = "Feature Selection, KTH-TIPS, Local Binary Pattern (LBP), Outex, Rotation Invariance, Texture Classification", author = "Rakesh Mehta and Karen Egiazarian", year = "2016", doi = "10.1016/j.patrec.2015.11.019", language = "English", volume = "71", pages = "16--22", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{f56eefa5d70c4b7eb6ce0891c06e2d4f, title = "Foveated Nonlocal Self-Similarity", abstract = "When we gaze a scene, our visual acuity is maximal at the fixation point (imaged by the fovea, the central part of the retina) and decreases rapidly towards the periphery of the visual field. This phenomenon is known as foveation. We investigate the role of foveation in nonlocal image filtering, installing a different form of self-similarity: the foveated self-similarity. We consider the image denoising problem as a simple means of assessing the effectiveness of descriptive models for natural images and we show that, in nonlocal image filtering, the foveated self-similarity is far more effective than the conventional windowed self-similarity. To facilitate the use of foveation in nonlocal imaging algorithms, we develop a general framework for designing foveation operators for patches by means of spatially variant blur. Within this framework, we construct several parametrized families of operators, including anisotropic ones. Strikingly, the foveation operators enabling the best denoising performance are the radial ones, in complete agreement with the orientation preference of the human visual system.", author = "Alessandro Foi and Giacomo Boracchi", note = "EXT={"}Boracchi, Giacomo{"}", year = "2016", doi = "10.1007/s11263-016-0898-1", language = "English", volume = "120", pages = "78–110", journal = "International Journal of Computer Vision", issn = "0920-5691", publisher = "Springer Verlag", number = "1", }
@article{33569653d17f4b468ccdcb44d663551f, title = "Graph Embedded Extreme Learning Machine", abstract = "In this paper, we propose a novel extension of the extreme learning machine (ELM) algorithm for single-hidden layer feedforward neural network training that is able to incorporate subspace learning (SL) criteria on the optimization process followed for the calculation of the network's output weights. The proposed graph embedded ELM (GEELM) algorithm is able to naturally exploit both intrinsic and penalty SL criteria that have been (or will be) designed under the graph embedding framework. In addition, we extend the proposed GEELM algorithm in order to be able to exploit SL criteria in arbitrary (even infinite) dimensional ELM spaces. We evaluate the proposed approach on eight standard classification problems and nine publicly available datasets designed for three problems related to human behavior analysis, i.e., the recognition of human face, facial expression, and activity. Experimental results denote the effectiveness of the proposed approach, since it outperforms other ELM-based classification schemes in all the cases.", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2016", doi = "10.1109/TCYB.2015.2401973", language = "English", volume = "46", pages = "311 -- 324", journal = "IEEE Transactions on Cybernetics", issn = "2168-2267", publisher = "IEEE Advancing Technology for Humanity", number = "1", }
@article{1493e9ae869947f38ea34852db1f03fe, title = "Gravity gradient routing for information delivery in fog Wireless Sensor Networks", abstract = "Fog Computing is a new paradigm that has been proposed by CISCO to take full advantage of the ever growing computational capacity of the near-user or edge devices (e.g., wireless gateways and sensors). The paradigm proposes an architecture that enables the devices to host functionality of various user-centric services. While the prospects of Fog Computing promise numerous advantages, development of Fog Services remains under-investigated. This article considers an opportunity of Fog implementation for Alert Services on top of Wireless Sensor Network (WSN) technology. In particular, we focus on targeted WSN-alert delivery based on spontaneous interaction between a WSN and hand-held devices of its users. For the alert delivery, we propose a Gravity Routing concept that prioritizes the areas of high user-presence within the network. Based on the concept, we develop a routing protocol, namely the Gradient Gravity Routing (GGR) that combines targeted delivery and resilience to potential sensor-load heterogeneity within the network. The protocol has been compared against a set of state-of-the-art solutions via a series of simulations. The evaluation has shown the ability of GGR to match the performance of the compared solutions in terms of alert delivery ratio, while minimizing the overall energy consumption of the network.", keywords = "Fog Computing, User-awareness, Wireless sensor networks", author = "Stepan Ivanov and Sasitharan Balasubramaniam and Dmitri Botvich and Akan, {Ozgur B.}", year = "2016", doi = "10.1016/j.adhoc.2016.03.011", language = "English", volume = "46", pages = "61--74", journal = "Ad Hoc Networks", issn = "1570-8705", publisher = "Elsevier Science Publishers B. V.", }
@article{e400f63008c74c5b9ef1ddc60a2f3d87, title = "HTML5-based mobile agents for Web-of-Things", abstract = "Systems and services utilizing Internet-of-Things can benefit from dynamically updated software in a significant way. In this paper we show how the most advanced variant of moving code, mobile agents, can be used for operating and managing Internet-connected systems composed of gadgets, sensors and actuators. We believe that the use of mobile agents brings several benefits, for example, mobile agents help to reduce the network load, overcome network latency, and encapsulate protocols. In addition, they can perform autonomous tasks that would otherwise require extensive configuration. The need for moving agents is even more significant if the applications and other factors of the over experience should follow the user to new contexts. When multiple agents are used to provide the user with services, some mechanisms to manage the agents are needed. In the context of Internet-of-Things such management should reflect the physical spaces and other relevant contexts. In this paper we describe the technical solutions used in implementation of the mobile agents, describe two proof concepts and we also compare our solution to related work. We also describe our visions of the future work.", keywords = "Html5, Internet-of-things, Javascript, Mobile agents, Web applications, Web-of-things", author = "Voutilainen, {Jari Pekka} and Mattila, {Anna Liisa} and Kari Syst{\"a} and Tommi Mikkonen", year = "2016", language = "English", volume = "40", pages = "43--51", journal = "Informatica", issn = "0350-5596", publisher = "Slovene Society Informatika", number = "1", }
@inproceedings{f53085b12a8242228cd40d864513092e, title = "Methodology to obtain the security controls in multi-cloud applications", abstract = "What controls should be used to ensure adequate security level during operation is a non-trivial subject in complex software systems and applications. The problem becomes even more challenging when the application uses multiple cloud services which security measures are beyond the control of the application provider. In this paper, a methodology that enables the identification of the best security controls for multicloud applications whose components are deployed in heterogeneous clouds is presented. The methodology is based on application decomposition and modelling of threats over the components, followed by the analysis of the risks together with the capture of cloud business and security requirements. The methodology has been applied in the MUSA EU H2020 project use cases as the first step for building up the multi-cloud applications' security-aware Service Level Agreements (SLA). The identified security controls will be included in the applications' SLAs for their monitoring and fulfilment assurance at operation.", keywords = "Cyber-security Methodologies, Multi-cloud, Security-by-design, Threat Modelling", author = "Afolaranmi, {Samuel Olaiya} and {Gonzalez Moctezuma}, {Luis E.} and Massimiliano Rak and Valentina Casola and Erkuden Rios and {Martinez Lastra}, {Jose L.}", year = "2016", doi = "10.5220/0005912603270332", language = "English", volume = "1", pages = "327--332", booktitle = "CLOSER 2016 - Proceedings of the 6th International Conference on Cloud Computing and Services Science", publisher = "SCITEPRESS", }
@article{c9d1bbe656de44089fdd9b8ad3553fbd, title = "One-Class Classification based on Extreme Learning and Geometric Class Information", abstract = "In this paper, we propose an extreme learning machine (ELM)-based one-class classification method that exploits geometric class information. We formulate the proposed method to exploit data representations in the feature space determined by the network hidden layer outputs, as well as in ELM spaces of arbitrary dimensions. We show that the exploitation of geometric class information enhances performance. We evaluate the proposed approach in publicly available datasets and compare its performance with the recently proposed one-class extreme learning machine algorithm, as well as with standard and recently proposed one-class classifiers. Experimental results show that the proposed method consistently outperforms the remaining approaches.", keywords = "Big data, Extreme learning machine, Novelty detection, One-class classification", author = "Alexandros Iosifidis and Vasileios Mygdalis and Anastasios Tefas and Ioannis Pitas", note = "EXT={"}Tefas, Anastasios{"}", year = "2016", doi = "10.1007/s11063-016-9541-y", language = "English", pages = "1--16", journal = "Neural Processing Letters", issn = "1370-4621", publisher = "Springer Verlag", }
@article{63db159c74534ef0a4b9f53685018f7c, title = "On the arity gap of finite functions: Results and applications", abstract = "Let A be a finite set and B an arbitrary set with at least two elements. The arity gap of a function f : An → B is the minimum decrease in the number of essential variables when essential variables of f are identified. A non- Trivial fact is that the arity gap of such B-valued functions on A is at most |A|. Even less trivial to verify is the fact that the arity gap of B-valued functions on A with more than |A| essential variables is at most 2. These facts ask for a classification of B-valued functions on A in terms of their arity gap. In this paper, we survey what is known about this problem. We present a general characterization of the arity gap of B-valued functions on A and provide explicit classifications of the arity gap of Boolean and pseudo-Boolean functions. Moreover, we reveal unsettled questions related to this topic, and discuss links and possible applications of some results to other subjects of research.", author = "Miguel Couceiro and Erkko Lehtonen", year = "2016", language = "English", volume = "27", pages = "193--207", journal = "Journal of Multiple-Valued Logic and Soft Computing", issn = "1542-3980", publisher = "Old City Publishing", number = "2-3", }
@article{7daa7ad98b074c4290523defc600e72e, title = "Software Startups - A Research Agenda", abstract = "Software startup companies develop innovative, software-intensive products within limited time frames and with few resources, searching for sustainable and scalable business models. Software startups are quite distinct from traditional mature software companies, but also from micro-, small-, and medium-sized enterprises, introducing new challenges relevant for software engineering research. This paper's research agenda focuses on software engineering in startups, identifying, in particular, 70+ research questions in the areas of supporting startup engineering activities, startup evolution models and patterns, ecosystems and innovation hubs, human aspects in software startups, applying startup concepts in non-startup environments, and methodologies and theories for startup research. We connect and motivate this research agenda with past studies in software startup research, while pointing out possible future directions. While all authors of this research agenda have their main background in Software Engineering or Computer Science, their interest in software startups broadens the perspective to the challenges, but also to the opportunities that emerge from multi-disciplinary research. Our audience is therefore primarily software engineering researchers, even though we aim at stimulating collaborations and research that crosses disciplinary boundaries. We believe that with this research agenda we cover a wide spectrum of the software startup industry current needs.", keywords = "Research agenda, Software startup, Software-intensive systems", author = "Michael Unterkalmsteiner and Pekka Abrahamsson and Wang, {Xiao Feng} and Anh Nguyen-Duc and Syed Shah and Bajwa, {Sohaib Shahid} and Baltes, {Guido H.} and Kieran Conboy and Eoin Cullina and Denis Dennehy and Henry Edison and Carlos Fernandez-Sanchez and Juan Garbajosa and Tony Gorschek and Eriks Klotins and Laura Hokkanen and Fabio Kon and Ilaria Lunesu and Michele Marchesi and Lorraine Morgan and Markku Oivo and Christoph Selig and Pertti Sepp{\"a}nen and Roger Sweetman and Pasi Tyrv{\"a}inen and Christina Ungerer and Agustin Yag{\"u}e", note = "EXT={"}Shah, Syed{"}", year = "2016", doi = "10.5277/e-Inf160105", language = "English", volume = "10", pages = "89--123", journal = "e-Informatica Software Engineering Journal", issn = "1897-7979", publisher = "Wroclaw University of Technology", number = "1", }
@article{28651dc787944ac79c5558c602eb8d33, title = "Still image/video frame lossy compression providing a desired visual quality", abstract = "The problem of how to automatically provide a desired (required) visual quality in lossy compression of still images and video frames is considered in this paper. The quality can be measured based on different conventional and visual quality metrics. In this paper, we mainly employ human visual system (HVS) based metrics PSNR-HVS-M and MSSIM since both of them take into account several important peculiarities of HVS. To provide a desired visual quality with high accuracy, iterative image compression procedures are proposed and analyzed. An experimental study is performed for a large number of grayscale test images. We demonstrate that there exist several coders for which the number of iterations can be essentially decreased using a reasonable selection of the starting value and the variation interval for the parameter controlling compression (PCC). PCC values attained at the end of the iterative procedure may heavily depend upon the coder used and the complexity of the image. Similarly, the compression ratio also considerably depends on the above factors. We show that for some modern coders that take HVS into consideration it is possible to give practical recommendations on setting a fixed PCC to provide a desired visual quality in a non-iterative manner. The case when original images are corrupted by visible noise is also briefly studied.", keywords = "Compression ratio, Lossy compression, Required quality, Visual quality metrics", author = "Alexander Zemliachenko and Vladimir Lukin and Nikolay Ponomarenko and Karen Egiazarian and Jaakko Astola", year = "2016", doi = "10.1007/s11045-015-0333-8", language = "English", volume = "27", pages = "697--718", journal = "Multidimensional Systems and Signal Processing", issn = "0923-6082", publisher = "Springer Verlag", number = "3", }
@inproceedings{747f12b272af443baab752f974e88c64, title = "Towards component-aware function point measurement", abstract = "Background. Function Point Analysis is the most used technique for sizing software functional specifications. Function Point measures are widely used to estimate the effort needed to develop software, hence the cost of software. However, Function Point Analysis adopts the point of view of the end user, and-consistently-considers a software application as a whole. This approach does not allow for assessing the role of reusable components in software development. In fact, reusing available components decreases the cost of software development, but standard Function Point measures are not able to account for the savings deriving from component reuse. Objective. We aim at modifying the definition of Function Point Analysis so that the role of components can be taken into account. More specifically, we redefine the measurement so that when no components are used the resulting measure is the same yielded by the standard measurement process, but in presence of components, our modified measure is less than the standard measure (the bigger the role of components, the smaller the measure). Method. Components partly support the realization of elementary processes. Therefore, we split elementary processes into sub-processes, such that each sub-process is either totally supported by a component or it is not supported at all by any component, the size of the elementary process is defined to be inversely proportional to the size of sub-processes supported by components. Results. The proposed approach was applied to a Web application, which was developed in two versions: one from scratch and one using available components. As expected, the 'component-aware' measures obtained are smaller than the standard measures. We also compared the reduction in size with the reduction in development effort. Conclusions. The proposed method proved effective in taking into account the usage of components in the development of the considered application. However, the observed decrease in size is smaller than the decrease of development effort. The latter result suggests that this initial proposal needs further experimentation to support accurate effort estimation.", keywords = "Comoponent-aware size measurement, Component-based development, Function Point Analysis, Functional size measurement", author = "Luigi Lavazza and Valentina Lenarduzzi and Davide Taibi", year = "2016", doi = "10.1109/IWSM-Mensura.2016.017", language = "English", pages = "35--44", booktitle = "Proceedings - 26th International Workshop on Software Measurement, IWSM 2016 and the 11th International Conference on Software Process and Product Measurement, Mensura 2016", publisher = "IEEE", }
@inproceedings{102d8aca224f4db3bd6b3a86363c24c8, title = "Network signatures based on gene pair expression ratios improve classification and the analysis of muscle-invasive urothelial cancer", abstract = "Urothelial cancer (UC) is highly recurrent and can progress from non-invasive (NMIUC) to a more aggressive muscle-invasive (MIUC) subtype that invades the muscle tissue layer of the bladder. We present a proof of principle study that network-based features of gene pairs can be used to improve classifier performance and the functional analysis of urothelial cancer gene expression data. In the first step of our procedure each individual sample of a UC gene expression dataset is inflated by gene pair expression ratios that are defined based on a given network structure. In the second step an elastic net feature selection procedure for network-based signatures is applied to discriminate between NMIUC and MIUC samples. We performed a repeated random subsampling cross validation in three independent datasets. The network signatures were characterized by a functional enrichment analysis and studied for the enrichment of known cancer genes. We observed that the network-based gene signatures from meta collections of proteinprotein interaction (PPI) databases such as CPDB and the PPI databases HPRD and BioGrid improved the classification performance compared to single gene based signatures. The network based signatures that were derived from PPI databases showed a prominent enrichment of cancer genes (e.g., TP53, TRIM27 and HNRNPA2Bl). We provide a novel integrative approach for large-scale gene expression analysis for the identification and development of novel diagnostical targets in bladder cancer. Further, our method allowed to link cancer gene associations to network-based expression signatures that are not observed in gene-based expression signatures.", keywords = "data feature space inflation, feature selection, gene pair expression ratio, muscle-invasive, non muscleinvasive, Urothelial cancer", author = "{De Matos Simoes}, Ricardo and Constantine Mitsiades and Williamson, {Kate E.} and Frank Emmert-Streib", year = "2015", month = "12", day = "16", doi = "10.1109/BIBM.2015.7359855", language = "English", pages = "1216--1223", booktitle = "2015 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)", publisher = "IEEE", }
@article{43903dfd5ae44fc7acd024944fcf4422, title = "Generative part-based Gabor object detector", abstract = "Discriminative part-based models have become the approach for visual object detection. The models learn from a large number of positive and negative examples with annotated class labels and location (bounding box). In contrast, we propose a part-based generative model that learns from a small number of positive examples. This is achieved by utilizing {"}privileged information{"}, sparse class-specific landmarks with semantic meaning. Our method uses bio-inspired complex-valued Gabor features to describe local parts. Gabor features are transformed to part probabilities by unsupervised Gaussian Mixture Model (GMM). GMM estimation is robustified for a small amount of data by a randomization procedure inspired by random forests. The GMM framework is also used to construct a probabilistic spatial model of part configurations. Our detector is invariant to translation, rotation and scaling. On part level invariance is achieved by pose quantization which is more efficient than previously proposed feature transformations. In the spatial model, invariance is achieved by mapping parts to an {"}aligned object space{"}. Using a small number of positive examples our generative method performs comparably to the state-of-the-art discriminative method.", keywords = "Gabor feature, Gaussian mixture model, Generative learning, Object detection, Visual classification", author = "Ekaterina Riabchenko and Joni-Kristian K{\"a}m{\"a}r{\"a}inen", note = "EXT={"}Riabchenko, Ekaterina{"}", year = "2015", month = "12", day = "15", doi = "10.1016/j.patrec.2015.08.004", language = "English", volume = "68", pages = "1--8", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", number = "P1", }
@inproceedings{8a2adb75be344be0b67715c0bc2b7489, title = "A State Space Tool for Concurrent System Models Expressed In C++", abstract = "This publication introduces a state space exploration tool that is based on representing the model under verification as a piece of C++ code that obeys certain conventions. This approach facilitates experimenting with many kinds of modelling ideas. On the other hand, the use of stubborn sets and symmetries requires that either the modeller or a preprocessor tool analyses the model at a syntactic level and expresses stubborn set obligation rules and the symmetry mapping as suitable C++ functions. The tool supports the detection of illegal deadlocks, safety errors, and may progress errors. It also partially supports the detection of must progress errors.", keywords = "model checking; stubborn sets; symmetries; safety; progress", author = "Antti Valmari", year = "2015", month = "12", day = "14", language = "English", volume = "1525", series = "CEUR Workshop Proceedings", publisher = "CEUR-WS.org", pages = "91--105", editor = "Jyrki Nummenmaa and Outi Sievi-Korte and Erkki M{\"a}kinen", booktitle = "SPLST 2015 Symposium on Programming Languages and Software Tools", }
@article{4d18b09276054911bd83b49d2f047f6b, title = "Time series trends in software evolution", abstract = "Background The laws of software evolution were formulated to describe time series trends in software over time. Objective Building on econometrics, the paper relates the laws theoretically to the concept of stationarity. The theoretical argumentation builds on the fact that in a stationary time series, the mean and variance remain constant. The concept is further elaborated with different statistical types of time series trends. These provide the objective for the empirical experiment that evaluates whether software size measures in a typical software evolution dataset are stationary. Method The time series analysis is based on conventional statistical tests for the evaluation of stationarity. Results The empirical dataset contains time series extracted from the version control systems used in Vaadin and Tomcat between circa 2006 and 2013. The results establish that the observed time series are neither stationary nor follow simple mathematical functions that would translate into stationarity. Conclusion The testing framework presented in the paper allows evaluating the stationarity of software evolution time series. The results can be interpreted theoretically against the laws of software evolution. These methodological and theoretical contributions improve the foundations of predictive time series modeling of software evolution problems.", keywords = "dynamic regression, software evolution, stationarity, time series analysis, unit roots", author = "Jukka Ruohonen and Sami Hyrynsalmi and Ville Lepp{\"a}nen", year = "2015", month = "12", day = "1", doi = "10.1002/smr.1755", language = "English", volume = "27", pages = "990--1015", journal = "Journal of Software: Evolution and Process", issn = "2047-7473", number = "12", }
@inproceedings{e06a997b459047c6872bd001eeb26ced, title = "Need to touch, wonder of discovery, and social capital: Experiences with interactive playful seats", abstract = "In this article we present findings from a design experiment of MurMur Moderators, talking playful seats facilitating playful atmosphere and creativity at office environments. The article describes the design and technological composition of our two prototypes, and our experiences exposing the concept to audiences at science fairs and an office environment. This research has served as an exploratory design study, directing our focus to the seats as primary and secondary play objects with a distinct narrative. Our goal with the initial exposure was to first investigate preliminary audience reactions for the high level concept and how people interact with the prototype. This was then supplemented by testing the concept in an office environment. The data we have collected gives us insight on the seats as primary and secondary play objects and how users touch, discover and socialize.", keywords = "Arduino, Audio feedback, Design research, DIY, Game studies, Internet of things, Office play, Playful furniture, Raspberry Pi", author = "Timo Nummenmaa and Heikki Tyni and Annakaisa Kultima and Kati Alha and Jussi Holopainen", year = "2015", month = "11", day = "16", doi = "10.1145/2832932.2832959", language = "English", volume = "16-19-November-2015", booktitle = "ACE 2015 - 12th Advances in Computer Entertainment Technology Conference, Proceedings", publisher = "Association for Computing Machinery", }
@inproceedings{68c88d95e21a400895cda926bc04b911, title = "Who is moving - User or device? Experienced quality of mobile 3D video in vehicles", abstract = "'Viewing while commuting' is a typical use case for mobile video. However, experimental and behavioral influences of watching three-dimensional (3D) video in vibrating vehicles have not been widely researched. The goal of this study is 1) to explore the influence of video presentation modes (two-dimensional and stereoscopic 3D) on the quality of experience and 2) to understand the nature of the movement patterns that users perform to maintain an optimal viewing position while viewing videos on a mobile device in three commuting contexts and in a controlled laboratory environment. A hybrid method for quality evaluation was used for combining quantitative preference ratings, qualitative descriptions of quality, situational audio/video data-collection, and sensors. The high-quality and heterogeneous audiovisual stimuli were viewed on a mobile device equipped with a parallax barrier display. The results showed that the stereoscopic 3D (S3D) video presentation mode provided more satisfying quality of experience than the two-dimensional presentation mode in all studied contexts. To maintain an optimal viewing position in the vehicles, the users moved the device in their hands to the directions around the vertical and the horizontal axes in a leaned sitting position. This movement behavior was guided by the contexts but not by the quality, indicating the general importance of these results for mobile video viewing in vibrating vehicles.", keywords = "3D, Experienced quality, Mobile video, Movement, Perception, Quasi-experiments", author = "Satu Jumisko-Pyykk{\"o} and Panos Markopoulos and Hannuksela, {Miska M.}", year = "2015", month = "11", day = "16", doi = "10.1145/2832932.2832948", language = "English", booktitle = "ACE 2015 - 12th Advances in Computer Entertainment Technology Conference, Proceedings", publisher = "ACM", }
@inproceedings{ca59f2dd063848d79609b3cc91316e53, title = "Collaborative navigation in virtual worlds: How gender and game experience influence user behavior", abstract = "There exists a large base of evidence for gender differences in human navigation. However, there is not much research on gender differences in collaborative aspects of navigation, including the interaction of individuals during collaborative wayfinding tasks in virtual environments. In light of this, we present a study of a collaborative virtual environment, Berlin Kompass. The goal of this study was to find out the main differences between genders in collaborative wayfinding. The application was evaluated in the context of foreign language learning in schools with over 200 students, where the users navigated through cityscapes while interacting verbally with each other. We collected and analyzed interaction logs, questionnaire data and audio and video recordings to gain insights into gender-related differences in wayfinding in virtual worlds. Our findings suggest that several differences that are evident in single user systems are not present when the collaborative aspect is added. Male users were more immersed during the task than females. One of the explaining factors for this might be video game experience. Genders also communicated differently - males spoke in longer utterances whereas females had more, shorter utterances. Males referred more to relative directions and dynamic landmarks such as cars and pedestrians while navigating. Males with more video game experience also provided more positive subjective user experience feedback on the application.", keywords = "Gender differences, Virtual environments, Wayfinding", author = "Pekka Kallioniemi and Tomi Heimonen and Markku Turunen and Jaakko Hakulinen and Tuuli Keskinen and Laura Pihkala-Posti and Jussi Okkonen and Roope Raisamo", year = "2015", month = "11", day = "13", doi = "10.1145/2821592.2821610", language = "English", volume = "13-15-November-2015", pages = "173--182", booktitle = "Proceedings - VRST 2015: 21st ACM Symposium on Virtual Reality Software and Technology", publisher = "Association for Computing Machinery", }
@inproceedings{7921e932d362415d84355800ac64e91c, title = "Executing dataflow actors as kahn processes", abstract = "Programming models which specify an application as a network of independent computational elements have emerged as a promising paradigm for programming streaming applications. The antagonism between expressivity and analysability has led to a number of different such programming models, which provide different degrees of freedom to the programmer. One example are Kahn process networks (KPNs), which, due to certain restrictions in communication, can guarantee determinacy (their results are independent of timing by construction). On the other hand, certain dataflow models, such as the CAL Actor Language, allow non-determinacy and thus higher expressivity, however at the price of static analysability and thus a potentially less efficient implementation. In many cases, however, non-determinacy is not required (or even not desired), and relying on KPN for the implementation seems advantageous. In this paper, we propose an algorithm for classifying dataflow actors (i.e. computational elements) as KPN compatible or potentially not. For KPN compatible dataflow actors, we propose an automatic KPN translation method based on this algorithm. In experiments, we show that more than 75{\%} of all mature actors of a standard multimedia benchmark suite can be classified as KPN compatible and that their execution time can be reduced by up to 1.97x using our proposed translation technique. Finally, in a manual classification effort, we validate these results and list different classes of KPN incompatibility.", keywords = "classification, Dataflow programming, Kahn process networks", author = "Andreas Tretter and Jani Boutellier and James Guthrie and Lars Schor and Lothar Thiele", year = "2015", month = "11", day = "4", doi = "10.1109/EMSOFT.2015.7318265", language = "English", pages = "105--114", booktitle = "2015 Proceedings of the International Conference on Embedded Software, EMSOFT 2015", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@article{7be1d64fadcc48b18d0e716ff608ac97, title = "Sparse extreme learning machine classifier exploiting intrinsic graphs", abstract = "This paper presents an analysis of the recently proposed sparse extreme learning machine (S-ELM) classifier and describes an optimization scheme that can be used to calculate the network output weights. This optimization scheme exploits intrinsic graph structures in order to describe geometric data relationships in the so-called ELM space. Kernel formulations of the approach operating in ELM spaces of arbitrary dimensions are also provided. It is shown that the application of the optimization scheme exploiting geometric data relationships in the original ELM space is equivalent to the application of the original S-ELM to a transformed ELM space. The experimental results show that the incorporation of geometric data relationships in S-ELM can lead to enhanced performance.", keywords = "Intrinsic graphs, Single-hidden layer neural networks, Sparse extreme learning machine", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2015", month = "11", day = "1", doi = "10.1016/j.patrec.2015.07.036", language = "English", volume = "65", pages = "192--196", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{fcf75ef1bf4f4724bfa5ca507657140b, title = "Model selection for linear classifiers using Bayesian error estimation", abstract = "Regularized linear models are important classification methods for high dimensional problems, where regularized linear classifiers are often preferred due to their ability to avoid overfitting. The degree of freedom of the model dis determined by a regularization parameter, which is typically selected using counting based approaches, such as K-fold cross-validation. For large data, this can be very time consuming, and, for small sample sizes, the accuracy of the model selection is limited by the large variance of CV error estimates. In this paper, we study the applicability of a recently proposed Bayesian error estimator for the selection of the best model along the regularization path. We also propose an extension of the estimator that allows model selection in multiclass cases and study its efficiency with L-1 regularized logistic regression and L-2 regularized linear support vector machine. The model selection by the new Bayesian error estimator is experimentally shown to improve the classification accuracy, especially in small sample-size situations, and is able to avoid the excess variability inherent to traditional cross-validation approaches. Moreover, the method has significantly smaller computational complexity than cross-validation. (C) 2015 Elsevier Ltd. All rights reserved.", keywords = "Logistic regression, Support vector machine, Regularization, Bayesian error estimator, Linear classifier, MULTINOMIAL LOGISTIC-REGRESSION, SUPPORT VECTOR MACHINES, CLASSIFICATION, PERFORMANCE, BOUNDS", author = "Heikki Huttunen and Jussi Tohka", note = "EXT={"}Tohka, Jussi{"}", year = "2015", month = "11", doi = "10.1016/j.patcog.2015.05.005", language = "English", volume = "48", pages = "3739--3748", journal = "Pattern Recognition", issn = "0031-3203", publisher = "ELSEVIER SCI LTD", number = "11", }
@inproceedings{417cf285b95b41bf89918fc1fc1c8604, title = "Antroposeeni - A mixed reality game", abstract = "In this paper, we describe Antroposeeni, a mixed reality game designed and developed for mobile devices. Antroposeeni utilizes location-based services, GPS for tracking users and augmented reality techniques for displaying captivating audiovisual content and creating rich experiences. Our demonstration will introduce a pilot version of the game, which encompasses narrative elements of the game mediated through developed media technologies. The goal for the demonstration is to give the conference visitors a chance to test the game in a specifically tailored route close to the conference site. After conducting the pilot we plan to organize a short review regarding the user experience.", keywords = "Aesthetics, Art, Augmented reality, Design, Games, Mixed reality, Software design, Theatre, User experience", author = "Matti Luhtala and Tuomo Karvonen and Jyrki Pylv{\"a}s and Aki Ala-Kokko and Reina Magica and Yuko Takeda and Markku Turunen", year = "2015", month = "9", day = "22", doi = "10.1145/2818187.2818287", language = "English", pages = "211--213", booktitle = "ACADEMICMINDTREK 2015 - Proceedings of the 19th International Academic Mindtrek Conference", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{1a7e9f0af2bd4636ba6f01f6e0a28e6e, title = "OASIS deck of cards - House of colleagues: A playful", abstract = "A research experiment to facilitate playful interaction and community learning within an academic organization of about 170 employees was conducted. A 2-player card game including 61 'staff character cards' and 39 question cards was implemented to be played by the relatively new community. The game period, including supporting events, ran for 5 weeks. After the experiment 59 staff members responded to an online survey on play experiences. The results showed that ways of participation and means of play are more diverse in a work community context than as they are specified in the game rules. More emphasis should be set on framing the game and supporting it as a continuous activity to become a playful practice in the work community. An academic community has inherent contextual prerequisites that need to be addressed in order for a playful practice to gain traction as a means for community building.", keywords = "Academia, Adult play, Attitudes towards play, Card game, Community, Design, Play at work, Playfulness, University", author = "Timo Nummenmaa and Annakaisa Kultima and Ville Kankainen and Sampo Savolainen and Antti Syv{\"a}nen and Kati Alha and Frans M{\"a}yr{\"a}", year = "2015", month = "9", day = "22", doi = "10.1145/2818187.2818296", language = "English", pages = "2--9", booktitle = "ACADEMICMINDTREK 2015 - Proceedings of the 19th International Academic Mindtrek Conference", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{a2d9d9690a7a4cf7ba0090f13a583d60, title = "Haptic feedback of gaze gestures with glasses: Localization accuracy and effectiveness", abstract = "Wearable devices including smart eyewear require new interaction methods between the device and the user. In this paper, we describe our work on the combined use of eye tracking for input and haptic (touch) stimulation for output with eyewear. Input with eyes can be achieved by utilizing gaze gestures which are predefined patterns of gaze movements identified as commands. The frame of the eyeglasses offers three natural contact points with the wearer's skin for haptic stimulation. The results of two user studies reported in this paper showed that stimulation moving between the contact points was easy for users to localize, and that the stimulation has potential to make the use of gaze gestures more efficient.", keywords = "Gaze gestures, Gaze tracking, Haptic stimulation, Haptics, Pervasive computing, Smart eyewear, Smart glasses, Wearable computing", author = "Jussi Rantala and Jari Kangas and Poika Isokoski and Deepak Akkil and Oleg Špakov and Roope Raisamo", year = "2015", month = "9", day = "7", doi = "10.1145/2800835.2804334", language = "English", pages = "855--862", booktitle = "UbiComp and ISWC 2015 - Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the Proceedings of the 2015 ACM International Symposium on Wearable Computers", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{47f6649d924d4415914534a1a4eb489e, title = "Augmenting Technology Trees: Automation and Tool Support", author = "Heinim{\"a}ki, {Teemu J.} and Tapio Elomaa", year = "2015", month = "9", doi = "10.1109/VS-GAMES.2015.7295765", language = "English", isbn = "978-1-4799-8101-4", pages = "68--75", booktitle = "Proceedings of the Seventh International Conference on Virtual Worlds and Games for Serious Applications (VS-Games 2015)", publisher = "IEEE", }
@inproceedings{33c32569525b44d2b41fada678979adb, title = "Software evolution and time series volatility: An empirical exploration", abstract = "The paper presents the first empirical study to examine econometric time series volatility modeling in the software evolution context. The econometric volatility concept is related to the conditional variance of a time series rather than the conditional mean targeted in conventional regression analysis. The software evolution context is motivated by relating these variance characteristics to the proximity of operating system releases, the theoretical hypothesis being that volatile characteristics increase nearby new milestone releases. The empirical experiment is done with a case study of FreeBSD. The analysis is carried out with 12 time series related to bug tracking, development activity, and communication. A historical period from 1995 to 2011 is covered under a daily sampling frequency. According to the results the time series dataset contains visible volatility characteristics, but these cannot be explained by the time windows around the six observed major FreeBSD releases. The paper consequently contributes to the software evolution research field with new methodological ideas, as well as with both positive and negative empirical results.", keywords = "ARIMA, Code churn, Conditional variance, FreeBSD, GARCH, Software evolution, Time series analysis, Volatility", author = "Jukka Ruohonen and Sami Hyrynsalmi and Ville Lepp{\"a}nen", year = "2015", month = "8", day = "30", doi = "10.1145/2804360.2804367", language = "English", volume = "30-Aug-2015", pages = "56--65", booktitle = "14th International Workshop on Principles of Software Evolution, IWPSE 2015 - Proceedings", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{4ed1d08ceece4883b8a01c3e57b33f0c, title = "Mobiscool: 1st workshop on mobile, social and culturally oriented learning", abstract = "There are two simultaneous transformative changes occuring in Education: the use of mobile and tablet devices for accessing educational content, and the rise of the MOOCs. Happening independently and in parallel are significant advances in interaction technologies through smartphones and tablets, and the rise in the use of social-media and social-network analytics in several domains. Given the extent of personal context that is available on the mobile device, how can the education experience be personalised, made social, and tailored to the cultural context of the learner? The goal of this proposal is twofold: (a) To understand the usage, and student behaviour in this new environment (MOOCS and mobile devices) and (b) To design experiments and implement them to make these new tools more effective by tailoring them to the individual student's personal, social and cultural settings and preferences.", keywords = "Augmented reality, Behaviour, Culture, Education, MOOCs, Multimedia, Social media, Social network analysis, User experience", author = "Nanavati, {A. A.} and N. Rajput and M. Turunen and H. Knoche and M. Rehm", year = "2015", month = "8", day = "24", doi = "10.1145/2786567.2795402", language = "English", pages = "1187--1190", booktitle = "MobileHCI 2015 - Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{9520ca0c08694671ada65b70d98d37aa, title = "Scinet: Interactive intent modeling for information discovery", abstract = "Current search engines offer limited assistance for exploration and information discovery in complex search tasks. Instead, users are distracted by the need to focus their cognitive efforts on finding navigation cues, rather than selecting relevant information. Interactive intent modeling enhances the human information exploration capacity through computational modeling, visualized for interaction. Interactive intent modeling has been shown to increase task-level information seeking performance by up to 100{\%}. In this demonstration, we showcase SciNet, a system implementing interactive intent modeling on top of a scientific article database of over 60 million documents.", keywords = "Intent modeling, Interactive information retrieval, Personalization, Visual information seeking", author = "Tuukka Ruotsalo and Jaakko Peltonen and Eugster, {Manuel J A} and Dorota Glowacka and Aki Reijonen and Giulio Jacucci and Petri Myllym{\"a}ki and Samuel Kaski", year = "2015", month = "8", day = "9", doi = "10.1145/2766462.2767863", language = "English", pages = "1043--1044", booktitle = "SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{e245e3b42f6247699a361497c4e6d0fc, title = "Collaborative filtering based on group coordinates for smoothing and directional sharpening", abstract = "Groups of mutually similar image blocks are the key element in nonlocal image processing. In this work, the spatial coordinates of grouped blocks are leveraged in two distinct parts of the transform-domain collaborative filtering within the BM3D algorithm. First, we introduce an adaptive 1-D transform for 3-D collaborative filtering based on sampling 2-D smooth functions at the positions of grouped blocks. This adaptive transform is applied for improved decorrelation of the 2-D spectra of the grouped blocks. Second, we propose a directional sharpening procedure whose strength varies adaptively according to the relative orientation of the transform basis functions with respect to the group coordinates. Experiments confirm the efficacy of the proposed adaptations, for denoising as well as for sharpening of noisy images.", keywords = "adaptive transforms, BM3D, collaborative filtering, denoising, sharpening", author = "Lucio Azzari and Alessandro Foi", year = "2015", month = "8", day = "4", doi = "10.1109/ICASSP.2015.7178235", language = "English", isbn = "9781467369978", pages = "1573--1577", booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings", publisher = "IEEE", }
@inproceedings{d4c12b9f627843a597fc0a42af38c498, title = "Enhancing class discrimination in Kernel Discriminant Analysis", abstract = "In this paper, we propose an optimization scheme aiming at optimal nonlinear data projection, in terms of Fisher ratio maximization. To this end, we formulate an iterative optimization scheme consisting of two processing steps: optimal data projection calculation and optimal class representation determination. Compared to the standard approach employing the class mean vectors for class representation, the proposed optimization scheme increases class discrimination in the reduced-dimensionality feature space. We evaluate the proposed method in standard classification problems, as well as on the classification of human actions and face, and show that it is able to achieve better generalization performance, when compared to the standard approach.", keywords = "Kernel Discriminant Analysis, Nonlinear data projection, Optimized Class Representation", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2015", month = "8", day = "4", doi = "10.1109/ICASSP.2015.7178306", language = "English", isbn = "9781467369978", pages = "1926--1930", booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@inproceedings{6daacbf921394c6087a3fac5a412a47a, title = "Exemplar-based speech enhancement for deep neural network based automatic speech recognition", abstract = "Deep neural network (DNN) based acoustic modelling has been successfully used for a variety of automatic speech recognition (ASR) tasks, thanks to its ability to learn higher-level information using multiple hidden layers. This paper investigates the recently proposed exemplar-based speech enhancement technique using coupled dictionaries as a pre-processing stage for DNN-based systems. In this setting, the noisy speech is decomposed as a weighted sum of atoms in an input dictionary containing exemplars sampled from a domain of choice, and the resulting weights are applied to a coupled output dictionary containing exemplars sampled in the short-time Fourier transform (STFT) domain to directly obtain the speech and noise estimates for speech enhancement. In this work, settings using input dictionary of exemplars sampled from the STFT, Mel-integrated magnitude STFT and modulation envelope spectra are evaluated. Experiments performed on the AURORA-4 database revealed that these pre-processing stages can improve the performance of the DNN-HMM-based ASR systems with both clean and multi-condition training.", keywords = "coupled dictionaries, deep neural networks, modulation envelope, non-negative matrix factorisation, speech enhancement", author = "Deepak Baby and Gemmeke, {Jort F.} and Tuomas Virtanen and {Van Hamme}, Hugo", year = "2015", month = "8", day = "4", doi = "10.1109/ICASSP.2015.7178819", language = "English", isbn = "9781467369978", pages = "4485--4489", booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@inproceedings{b95ad725659847e58f9da534502f4804, title = "Exploiting subclass information in one-class support vector machine for video summarization", abstract = "In this paper, we propose a method for video summarization based on human activity description. We formulate this problem as the one of automatic video segment selection based on a learning process that employs salient video segment paradigms. For this one-class classification problem, we introduce a novel variant of the One-Class Support Vector Machine (OC-SVM) classifier that exploits subclass information in the OC-SVM optimization problem, in order to jointly minimize the data dispersion within each subclass and determine the optimal decision function. We evaluate the proposed approach in three Hollywood movies, where the performance of the proposed SOC-SVM algorithm is compared with that of the OC-SVM. Experimental results denote that the proposed approach is able to outperform OC-SVM-based video segment selection.", keywords = "One class classification, Subclass One-Class SVM, Supervised Video Summarization", author = "Vasileios Mygdalis and Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2015", month = "8", day = "4", doi = "10.1109/ICASSP.2015.7178373", language = "English", isbn = "9781467369978", volume = "2015-August", pages = "2259--2263", booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@inproceedings{653bf9d438344f2abbc5f63247f2725c, title = "Low-complexity robust DOA estimation", abstract = "We propose a low complexity method for estimating direction of arrival (DOA) when the positions of the array sensors are affected by errors with known magnitude bound. This robust DOA method is based on solving an optimization problem whose solution is obtained in two stages. First, the problem is relaxed and the corresponding power estimation has an expression similar to that of standard beamforming. If the relaxed solution does not satisfy the magnitude bound, an approximation is made by projection. Unlike other robust DOA methods, no eigenvalue decomposition is necessary and the complexity is similar to that of MVDR. For low and medium SNR, the proposed method competes well with more complex methods and is clearly better than MVDR.", keywords = "direction of arrival, optimization, robustness, spectral power density", author = "Bogdan Dumitrescu and Cristian Rusu and Ioan Tabus and Jaakko Astola", year = "2015", month = "8", day = "4", doi = "10.1109/ICASSP.2015.7178480", language = "English", isbn = "9781467369978", pages = "2794--2798", booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@inproceedings{09d719dcbc4542b4bf3f44f1f5df9461, title = "Low-Latency Sound-Source-Separation using Non-Negative Matrix Factorisation with Coupled Analysis and Synthesis Dictionaries", abstract = "For real-time or close to real-time applications, sound source separation can be performed on-line, where new frames of incoming data for a mixture signal are processed as they arrive, at very low delay. We propose an approach which generates the separation filters for short synthesis frames to achieve low latency source separation, based on a compositional model mixture of the audio to be separated. Filter parameters are derived from a longer temporal context than the current processing frame through use of a longer analysis frame. A pair of dictionaries are used, one for analysis and one for reconstruction. With this approach we are able to increase separation performance at low latencies whilst retaining the low-latency provided by the use of short synthesis frames. The proposed data handling scheme and parameters can be adjusted to achieve real-time performance, given sufficient computational power. Low-latency output allows a human listener to use the results of such a separation scheme directly, without a perceptible delay. With the proposed method, separated source-to-distortion ratios (SDRs) can be improved by over 1 dB for latencies below 20 ms, without any affect on latency.", keywords = "low-latency, NMF, Non-negative matrix factorisation, real-time, source separation", author = "Thomas Barker and Tuomas Virtanen and Pontoppidan, {Niels Henrik}", year = "2015", month = "8", day = "4", doi = "10.1109/ICASSP.2015.7177968", language = "English", isbn = "9781467369978", pages = "241--245", booktitle = "2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)", publisher = "IEEE", }
@inproceedings{83bcf5c484c1489a907b66d55da25c6d, title = "Similarity induced group sparsity for non-negative matrix factorisation", abstract = "Non-negative matrix factorisations are used in several branches of signal processing and data analysis for separation and classification. Sparsity constraints are commonly set on the model to promote discovery of a small number of dominant patterns. In group sparse models, atoms considered to belong to a consistent group are permitted to activate together, while activations across groups are suppressed, reducing the number of simultaneously active sources or other structures. Whereas most group sparse models require explicit division of atoms into separate groups without addressing their mutual relations, we propose a constraint that permits dynamic relationships between atoms or groups, based on any defined distance measure. The resulting solutions promote approximation with components considered similar to each other. Evaluation results are shown for speech enhancement and noise robust speech and speaker recognition.", keywords = "group sparsity, non-negative matrix factorization, sparse representations, speaker recognition, speech recognition", author = "Antti Hurmalainen and Rahim Saeidi and Tuomas Virtanen", year = "2015", month = "8", day = "4", doi = "10.1109/ICASSP.2015.7178807", language = "English", isbn = "9781467369978", pages = "4425--4429", booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@article{48c0447d58de4ca9af8c7a3999af2ab1, title = "Automatic image-based detection and inspection of paper fibres for grasping", abstract = "An automatic computer vision algorithm that detects individual paper fibres from an image, assesses the possibility of grasping the detected fibres with microgrippers and detects the suitable grasping points is presented. The goal of the algorithm is to enable automatic fibre manipulation for mechanical characterisation, which has traditionally been slow manual work. The algorithm classifies the objects in images based on their morphology, and detects the proper grasp points from the individual fibres by applying given geometrical constraints. The authors test the ability of the algorithm to detect the individual fibres with 35 images containing more than 500 fibres in total, and also compare the graspability analysis and the calculated grasp points with the results of an experienced human operator with 15 images that contain a total of almost 200 fibres. The detection results are outstanding, with fewer than 1{\%} of fibres missed. The graspability analysis gives sensitivity of 0.83 and specificity of 0.92, and the average distance between the grasp points of the human and the algorithm is 220 μm. Also, the choices made by the algorithm are much more consistent than the human choices.", author = "Juha Hirvonen and Pasi Kallio", year = "2015", month = "8", day = "1", doi = "10.1049/iet-cvi.2014.0416", language = "English", volume = "9", pages = "588--594", journal = "IET Computer Vision", issn = "1751-9632", publisher = "Institution of Engineering and Technology", number = "4", }
@inproceedings{7feecdd8833f45659bafe9216d092144, title = "Exploring the Stability of Software with Time-Series Cross-Sectional Data", abstract = "The stability of software is a classical topic in software engineering. This research investigates stability of software architectures in terms of an object-oriented design principle presented by Robert C. Martin. The research approach is statistical: the design principle is evaluated with a time-series cross-sectional (TSCS) regression model. The empirical sample covers a release history from the Java library Vaadin. The empirical results establish that the design principle cannot be used to characterize the library. Besides delivering this negative empirical result, the research provides the necessary methodological background that is required to understand TSCS modeling.", keywords = "panel data, software metrics, software stability", author = "Jukka Ruohonen and Sami Hyrynsalmi and Ville Lepp{\"a}nen", year = "2015", month = "7", day = "31", doi = "10.1109/SAM.2015.13", language = "English", pages = "41--47", booktitle = "Proceedings - 2nd International Workshop on Software Architecture and Metrics, SAM 2015", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{11dd5cf6f4d94756b780fc27169be5e9, title = "Mashing Up Software Issue Management, Development, and Usage Data", abstract = "Modern software development approaches rely extensively on tools. Motivated by practices such as continuous integration, deployment and delivery, these tools are used in a fashion where data are automatically accumulated in different databases as a side-effect of everyday development activities. In this paper we introduce an approach for software engineering data visualization as a mash up that combines data from issue management, software development and production use. The visualization can show to all stake holders how well continuous delivery is realized in the project. The visualization clearly shows the time spent to specify and develop the features as well the length of the delivery cycle. Further more the visualization shows how much work is unfinished and waiting for delivery. This can help the development team to decrease the amount of unfinished work and by that help them to keep up in continuous delivery mind set. In addition to development data usage of the features is also visualized.", keywords = "Continuous Delivery, Information Visualization, Software Analytics", author = "Anna-Liisa Mattila and Timo Lehtonen and Henri Terho and Tommi Mikkonen and Kari Syst{\"a}", year = "2015", month = "7", day = "24", doi = "10.1109/RCoSE.2015.12", language = "English", isbn = "9781479919345", pages = "26--29", booktitle = "2015 IEEE/ACM 2nd International Workshop on Rapid Continuous Software Engineering (RCoSE)", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@inproceedings{8b886976342d4b079641bb87352bad9f, title = "Four patterns for internal startups", abstract = "In this paper, we describe patterns that are meant for founding internal startups in a larger company. The patterns are part of a larger pattern language for software startup companies. The patterns presented here cover four main parts of an internal startup's life cycle starting from idea creation by enabling innovation with 20 Rule. The second pattern introduces an incubator phase, where the idea is validated to have a sensible problem and solution. This optimally leads to the creation of an internal startup, where resources are allocated to concretize the idea. With restricted resources such as a limited time, the internal startup may find a new Product-Market fit and offer a validated business opportunity for the parent company. This is concluded by the Exit decision by the parent company and ends the internal startup's life cycle.", keywords = "Internal startup, Lean startup, Organization, Organizational patterns, Patterns", author = "Marko Lepp{\"a}nen and Laura Hokkanen", year = "2015", month = "7", day = "8", doi = "10.1145/2855321.2855327", language = "English", booktitle = "Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015", publisher = "ACM", }
@inproceedings{fb5809bccf7b45629bb84e8e0c66e3d4, title = "Three patterns for user involvement in startups", abstract = "Creating products in software startups consists of a great deal of uncertainty combined with little resources. Rapid validation of created solutions with the potential customers is essential to startups. However, often startups lack people with skills needed for the validation. We present three patterns that help in involving users to gain meaningful feedback and learning. First, the feedback has to be gotten from the right people and the right questions have to be asked. Furthermore, if the feedback is collected with a prototype, often called a Minimum Viable Product, users should be able to give feedback of the actual idea, not to any roughness caused by the immaturity and the prototypishness of the product.", keywords = "Lean, Startups, User experience", author = "Laura Hokkanen and Marko Lepp{\"a}nen", year = "2015", month = "7", day = "8", doi = "10.1145/2855321.2855373", language = "English", booktitle = "Proceedings of the 20th European Conference on Pattern Languages of Programs, EuroPLoP 2015", publisher = "ACM", }
@article{9f02a7bfc32848e08ae3e8f5d8fec955, title = "Railway fastener inspection by real-time machine vision", abstract = "In this paper, a real-time railway fastener detection system using a high-speed laser range finder camera is presented. First, an extensive analysis of various methods based on pixel-wise and histogram similarities are conducted on a specific railway route. Then, a fusing stage is introduced which combines least correlated approaches also considering the performance upgrade after fusing. Then, the resulting method is tested on a larger database collected from a different railway route. After observing repeated successes, the method is implemented on NI LabVIEW and run real-time with a high-speed 3-D camera placed under a railway carriage designed for railway quality inspection.", keywords = "High-speed laser range finder, railway fastener detection, railway inspection", author = "Caglar Aytekin and Yousef Rezaeitabar and Sedat Dogru and Ilkay Ulusoy", year = "2015", month = "7", day = "1", doi = "10.1109/TSMC.2014.2388435", language = "English", volume = "45", pages = "1101--1107", journal = "IEEE Transactions on Systems, Man, and Cybernetics: Systems", issn = "1083-4427", publisher = "Institute of Electrical and Electronics Engineers", number = "7", }
@inproceedings{ff4e49ff300d43648ec945cad5bf26c3, title = "A time-optimal bounded velocity path-following controller for generic Wheeled Mobile Robots", abstract = "This paper, as a generalization of our previous works, presents a unified time-optimal path-following controller for Wheeled Mobile Robots (WMRs). Unlike other path-following controllers, we solve the path-following problem for all common categories of WMRs such as car-like, differential, omnidirectional, all wheels steerable and others. We show that the insertion of our path-following controller into the kinematic and non-holonomic constraints of the wheels, simplifies the otherwise impenetrable constraints, resulting in explicit monotonic functions between the velocity of the base and that of the wheels. Based on this foundation, we present a closed-form solution that keeps all the wheels' steering and driving velocities within their corresponding pre-specified bounds. Simulation data and experimental results from executing the controller in a real-time environment demonstrate the efficacy of the method.", author = "Reza Oftadeh and Reza Ghabcheloo and Jouni Mattila", year = "2015", month = "6", day = "29", doi = "10.1109/ICRA.2015.7139252", language = "English", isbn = "978-1-4799-6923-4", pages = "676--683", booktitle = "2015 IEEE International Conference on Robotics and Automation (ICRA), 26-30 May 2015, Seattle, WA", publisher = "Institute of Electrical and Electronics Engineers IEEE", }
@inproceedings{879396926c3a4c7a85548b84084007ce, title = "Collaborative cloud-based management of home networks", abstract = "Future home networks are expected to become extremely sophisticated, yet only the most technically adept persons are equipped with skills to manage them. In this paper, we provide a novel solution as to how complex smart home networks can be collaboratively managed with the assistance of operators and third party experts. Our solution rests in separating the management and control functionalities of the home access points and routers, away from the actual connectivity, traffic forwarding and routing operations within the home network. By so doing, we present a novel REST-based architecture in which the management of the home network can be hosted in an entirely separate, external cloud-based infrastructure, which models the network within the home as a resource graph.", keywords = "Cloud, Homenet, IoT, Network Management", author = "Bilhanan Silverajan and Juha-Pekka Luoma and Markku Vajaranta and Riku It{\"a}puro", year = "2015", month = "6", day = "29", doi = "10.1109/INM.2015.7140376", language = "English", isbn = "9783901882760", pages = "786--789", booktitle = "Proceedings of the 2015 IFIP/IEEE International Symposium on Integrated Network Management, IM 2015", publisher = "IEEE", }
@inproceedings{008f443073e84141981624c3686dd339, title = "Electroplated nickel microspring and low-friction precision linear slider: A novel micro-force sensing tool", abstract = "This paper introduces a novel micro-force sensing approach utilizing an electroplated nickel microspring and a precision linear slider (PLS) for micro-tensile testing applications. After investigating the effects of friction forces in a PLS, an electroplated nickel microspring is designed, fabricated and integrated into the PLS, and the proposed micro-force sensor concept is validated through experimental results. The microspring fabricated in this paper is limited to forces up to 6 mN with the average sensitivity of 36.63 μN/μm. It is shown that the friction forces introduce uncertainties only to the forces less than 500 μN. The proposed approach allows the fabrication of micro-force sensors for the force ranges of up to tens of Millinewtons for different applications.", author = "Pooya Saketi and Peihua Wangyang and Haihua Li and Qingkang Wang and Pasi Kallio", year = "2015", month = "6", day = "29", doi = "10.1109/ICRA.2015.7139561", language = "English", isbn = "9781479969241", pages = "2679--2684", booktitle = "2015 IEEE International Conference on Robotics and Automation (ICRA), 26-30 May 2015,Seattle, WA", }
@inproceedings{a8d73b04ff78455cb4958157527570c1, title = "Novel pairwise coupled kinematic solution for algebraic angular acceleration estimation of serial link manipulators", abstract = "We consider low-noise angular acceleration estimation for multi-axis robotic manipulators. The proposed model uses pairwise coupled inertial measurements across a section of the kinematic chain, which is reduced to a single rigid body. Experimental validation is built upon compact low-power micro-electro-mechanical (MEMS) components, installed on a full-scale heavy-duty mobile manipulator. While the model itself has a built-in mechanism for common-mode disturbance rejection, an adaptive transversal filter is devised for a further improvement. The results indicate a 40-80 fold suppression of high-frequency perturbations with respect to a baseline motion derivative, the discrete difference. As inertial sensors require no mechanical contact to rotating axes and the number of parameters is kept low, the model is easily applicable to motion control feedback of typical heavy-duty manipulators.", author = "Juho Vihonen and Janne Honkakorpi and Jouni Mattila and Ari Visa", note = "ORG=sgn,0.5 ORG=iha,0.5", year = "2015", month = "6", day = "29", doi = "10.1109/ICRA.2015.7139271", language = "English", isbn = "978-1-4799-6923-4", pages = "809--814", booktitle = "2015 IEEE International Conference on Robotics and Automation (ICRA)", publisher = "Institute of Electrical and Electronics Engineers IEEE", }
@inproceedings{995f61d0ea9a4bab9205889c1661f91f, title = "Optimal sensing via multi-armed bandit relaxations in mixed observability domains", abstract = "Sequential decision making under uncertainty is studied in a mixed observability domain. The goal is to maximize the amount of information obtained on a partially observable stochastic process under constraints imposed by a fully observable internal state. An upper bound for the optimal value function is derived by relaxing constraints. We identify conditions under which the relaxed problem is a multi-armed bandit whose optimal policy is easily computable. The upper bound is applied to prune the search space in the original problem, and the effect on solution quality is assessed via simulation experiments. Empirical results show effective pruning of the search space in a target monitoring domain.", author = "Mikko Lauri and Risto Ritala", year = "2015", month = "6", day = "29", doi = "10.1109/ICRA.2015.7139867", language = "English", isbn = "978-1-4799-6923-4", volume = "2015-June", pages = "4807--4812", booktitle = "2015 IEEE International Conference on Robotics and Automation (ICRA), 26-30 May 2015, Seattle, WA", }
@inproceedings{5d7e375cfdb04800aec68b5bc28e7c2b, title = "A comparison of security assurance support of agile software development methods", abstract = "Agile methods increase the speed and reduce the cost of software projects; however, they have been criticized for lack of documentation, traditional quality control, and, most importantly, lack of security assurance - mostly due to their informal and self-organizing approach to software development. This paper clarifies the requirements for security assurance by using an evaluation framework to analyze the compatibility of established agile security development methods: XP, Scrum and Kanban, combined with Microsoft SDL security framework, against Finland's established national security regulation (Vahti). We also analyze the selected methods based on their role definitions, and provide some avenues for future research.", keywords = "DESMET, Kanban, Scrum, SDL, Secure agile development, Security assurance, Vahti, XP", author = "Kalle Rindell and Sami Hyrynsalmi and Ville Lepp{\"a}nen", year = "2015", month = "6", day = "25", doi = "10.1145/2812428.2812431", language = "English", volume = "1008", pages = "61--68", booktitle = "Computer Systems and Technologies - 16th International Conference, CompSysTech 2015: Proceedings", publisher = "Association for Computing Machinery", }
@article{5cb35d5f2f8d44728de5af6d9bbc141a, title = "Information retrieval approach to meta-visualization", abstract = "Visualization is crucial in the first steps of data analysis. In visual data exploration with scatter plots, no single plot is sufficient to analyze complicated high-dimensional data sets. Given numerous visualizations created with different features or methods, meta-visualization is needed to analyze the visualizations together. We solve how to arrange numerous visualizations onto a meta-visualization display, so that their similarities and differences can be analyzed. Visualization has recently been formalized as an information retrieval task; we extend this approach, and formalize meta-visualization as an information retrieval task whose performance can be rigorously quantified and optimized. We introduce a machine learning approach to optimize the meta-visualization, based on an information retrieval perspective: two visualizations are similar if the analyst would retrieve similar neighborhoods between data samples from either visualization. Based on the approach, we introduce a nonlinear embedding method for meta-visualization: it optimizes locations of visualizations on a display, so that visualizations giving similar information about data are close to each other. In experiments we show such meta-visualization outperforms alternatives, and yields insight into data in several case studies.", keywords = "Meta-visualization, Neighbor embedding, Nonlinear dimensionality reduction", author = "Jaakko Peltonen and Ziyuan Lin", year = "2015", month = "5", day = "1", doi = "10.1007/s10994-014-5464-x", language = "English", volume = "99", pages = "189--229", journal = "Machine Learning", issn = "0885-6125", publisher = "Springer Verlag", number = "2", }
@inproceedings{9375c4cfa4f04081b6ac6ea01ed20ddd, title = "Glance awareness and gaze interaction in smartwatches", abstract = "Smartwatches are widely available and increasingly adopted by consumers. The most common way of interacting with smartwatches is either touching a screen or pressing buttons on the sides. However, such techniques require using both hands. We propose glance awareness and active gaze interaction as alternative techniques to interact with smartwatches. We will describe an experiment conducted to understand the user preferences for visual and haptic feedback on a {"}glance{"} at the wristwatch. Following the glance, the users interacted with the watch using gaze gestures. Our results showed that user preferences differed depending on the complexity of the interaction. No clear preference emerged for complex interaction. For simple interaction, haptics was the preferred glance feedback modality. Copyright is held by the author/owner(s).", keywords = "Gaze input, Haptic feedback, Wearable computing", author = "Deepak Akkil and Jari Kangas and Jussi Rantala and Poika Isokoski and Oleg Špakov and Roope Raisamo", year = "2015", month = "4", day = "18", doi = "10.1145/2702613.2732816", language = "English", volume = "18", pages = "1271--1276", booktitle = "CHI 2015 - Extended Abstracts Publication of the 33rd Annual CHI Conference on Human Factors in Computing Systems: Crossings", publisher = "Association for Computing Machinery", }
@inproceedings{154f54dff9af4f12a44e3cafdb8e18e5, title = "Intentstreams: Smart parallel search streams for branching exploratory search", abstract = "The user's understanding of information needs and the information available in the data collection can evolve during an exploratory search session. Search systems tailored for well-defined narrow search tasks may be suboptimal for exploratory search where the user can sequentially refine the expressions of her information needs and explore alternative search directions. A major challenge for exploratory search systems design is how to support such behavior and expose the user to relevant yet novel information that can be difficult to discover by using conventional query formulation techniques. We introduce IntentStreams, a system for exploratory search that provides interactive query refinement mechanisms and parallel visualization of search streams. The system models each search stream via an intent model allowing rapid user feedback. The user interface allows swift initiation of alternative and parallel search streams by direct manipulation that does not require typing. A study with 13 participants shows that IntentStreams provides better support for branching behavior compared to a conventional search system.", keywords = "Information exploration, Parallel browsing, User interface design", author = "Salvatore Andolina and Khalil Klouche and Jaakko Peltonen and Mohammad Hoque and Tuukka Ruotsalo and Diogo Cabral and Arto Klami and Dorota Głowacka and Patrik Flor{\'e}en and Giulio Jacucci", year = "2015", month = "3", day = "18", doi = "10.1145/2678025.2701401", language = "English", volume = "2015-January", pages = "300--305", booktitle = "IUI 2015 - Proceedings of the 20th ACM International Conference on Intelligent User Interfaces", publisher = "Association for Computing Machinery", }
@article{05f2ca8f74e94ac29952296057f6e630, title = "On the kernel Extreme Learning Machine classifier", abstract = "In this paper, we discuss the connection of the kernel versions of the ELM classifier with infinite Single-hidden Layer Feedforward Neural networks and show that the original ELM kernel definition can be adopted for the calculation of the ELM kernel matrix for two of the most common activation functions, i.e., the RBF and the sigmoid functions. In addition, we show that a low-rank decomposition of the kernel matrix defined on the input training data can be exploited in order to determine an appropriate ELM space for input data mapping. The ELM space determined from this process can be subsequently used for network training using the original ELM formulation. Experimental results denote that the adoption of the low-rank decomposition-based ELM space determination leads to enhanced performance, when compared to the standard choice, i.e., random input weights generation.", keywords = "Extreme learning machine, Infinite networks, Single-hidden layer networks", author = "Alexandros Iosifidis and Anastastios Tefas and Ioannis Pitas", year = "2015", month = "3", day = "1", doi = "10.1016/j.patrec.2014.12.003", language = "English", volume = "54", pages = "11--17", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{4bdf384d96b74e6e93ff3985fdd6568f, title = "The highways and country roads to continuous deployment", abstract = "As part of a Finnish research program, researchers interviewed 15 information and communications technology companies to determine the extent to which the companies adopted continuous deployment. They also aimed to find out why continuous deployment is considered beneficial and what the obstacles are to its full adoption. The benefits mentioned the most often were the ability to get faster feedback, the ability to deploy more often to keep customers satisfied, and improved quality and productivity. Despite understanding the benefits, none of the companies adopted a fully automatic deployment pipeline. The companies also had higher continuous-deployment capability than what they practiced. In many cases, they consciously chose to not aim for full continuous deployment. Obstacles to full adoption included domain-imposed restrictions, resistance to change, customer desires, and developers' skill and confidence.", keywords = "continuous delivery, continuous deployment, continuous integration, software development, software engineering, thematic analysis", author = "Marko Lepp{\"a}nen and Simo M{\"a}kinen and Max Pagels and Veli-Pekka Eloranta and Juha Itkonen and M{\"a}ntyl{\"a}, {Mika V.} and Tomi M{\"a}nnist{\"o}", year = "2015", month = "3", day = "1", doi = "10.1109/MS.2015.50", language = "English", volume = "32", pages = "64--72", journal = "IEEE Software", issn = "0740-7459", publisher = "Institute of Electrical and Electronics Engineers", number = "2", }
@article{224b18a6a67f4b549301e9991609f0b0, title = "The MOBISERV-AIIA eating and drinking multi-view database for vision-based assisted living", abstract = "Assisted living has a particular social importance in most developed societies, due to the increased life expectancy of the general population and the ensuing ageing problems. It has also importance for the provision of improved home care in cases of disabled persons or persons suffering from certain diseases that have high social impact. In this context, the development of computer vision systems capable to identify human eating and drinking activity can be really useful in order to prevent undernourishment/malnutrition and dehydration in a smart home environment targeting to extend independent living of older persons in the early stage of dementia. In this paper, we first describe the human centered interface specifications and implementations for such a system, which can be supported by ambient intelligence and robotic technologies. We, subsequently, describe a multi-view eating and drinking activity recognition database that has been created in order to facilitate research towards this direction. The database has been created by using four cameras in order to produce multi-view videos, each depicting one of twelve persons having a meal, resulting to a database size equal to 59.68 hours in total. Various types of meals have been recorded, i.e., breakfast, lunch and fast food. Moreover, the persons have different sizes, clothing and are of different sex. The database has been annotated in a frame base in terms of person ID and activity class. We hope that such a database will serve as a benchmark data set for computer vision researchers in order to devise methods targeting to this important application.", keywords = "Activity recognition, Multiview video database, Nutrition assistance, Smart home environment", author = "A. Iosifidis and E. Marami and A. Tefas and I. Pitas and K. Lyroudia", year = "2015", month = "3", day = "1", language = "English", volume = "6", pages = "254--273", journal = "Journal of Information Hiding and Multimedia Signal Processing", issn = "2073-4212", publisher = "National Kaohsiung University of Applied Sciences", number = "2", }
@inproceedings{8aeb5d4faa6b4373aa329c302bfb6d8c, title = "LTE indoor MIMO performances field measurements", abstract = "Long-term evolution (LTE) and multiple input multiple output (MIMO) have earned reputations to be a cutting-edge technology, which can boost significantly wireless communication performances. The paper aims at providing LTE MIMO performances in indoor environments and, therefore, guidelines for network operators can be proposed. Medium access control throughput (MAC TP) and some system parameters in LTE network that are linked with MAC TP, such as Channel Quality Indicator (CQI), Modulation and Coding Scheme (MCS), Ranking Indicator (RI), Pre-coding Matrix Indicator (PMI), as well as MIMO utilization, are analysed. Effects of indoor propagation, Line of Sight (LoS), No-line of Sight (NLoS), strong and weak signal levels on Signal to Noise Radio (SNR) strength and MIMO utilization are clarified. In this paper, the performances of MIMO transmission mode over transmit diversity (TxDiv, Multiple Input-Single Output-MISO) and single antenna (Single Input Multiple Output-SIMO) modes are also analyzed and compared at overall manner and at channel-specific manners.", keywords = "Field measurements, LTE, MIMO, MISO, OFDM, Rayleigh channel, Rician channel", author = "Duc Nguyen-Thanh and Thuong Le-Tien and Cao Bui-Thu and Toi Le-Thanh", note = "INT=elt,{"}Nguyen-Thanh, Duc{"}", year = "2015", month = "2", day = "17", doi = "10.1109/ATC.2014.7043361", language = "English", isbn = "9781479969555", pages = "84--89", booktitle = "International Conference on Advanced Technologies for Communications", publisher = "IEEE", }
@inproceedings{09d5839a880d44a8a81a65a8d6c5534c, title = "Adaptive spatial resolution selection for stereoscopic video compression with MV-HEVC: A frequency based approach", abstract = "One approach for stereoscopic video compression is to down sample the content prior to encoding and up sample it to the original spatial resolution after decoding. In this study it is shown that the ratio by which the content should be rescaled is sequence dependent. Hence, a frequency based method is introduced enabling fast and accurate estimation of the best down sampling ratio for different stereoscopic video clips. It is shown that exploiting this approach can bring 3.38{\%} delta bitrate reduction over five camera-captured sequences.", keywords = "frequency power spectrum, MVC, objective quality metrics, resolution adjustment", author = "Payman Aflaki and Hannuksela, {Miska M.} and Moncef Gabbouj", year = "2015", month = "2", day = "5", doi = "10.1109/ISM.2014.11", language = "English", isbn = "9781479943111", pages = "267--270", booktitle = "2014 IEEE International Symposium on Multimedia, ISM 2014, 10-12 Dec. 2014, Taichung", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@inproceedings{44fd894ce81d4c6b805175163bccec05, title = "Salient event detection in basketball mobile videos", abstract = "Modern smartphones have become the most popular means for recording videos. In fact, thanks to their portability, smartphones allow for recording anything and at any moment of our everyday life. One common occasion is represented by sport happenings, where people often record their favourite team or players. Automatic analysis of such videos is important for enabling applications such as automatic organization, browsing and summarization of the content. This paper proposes novel algorithms for the detection of salient events in videos recorded at basketball games. The novel approach consists of jointly analyzing visual data and magnetometer data. The magnetometer data provides information about the horizontal orientation of the camera. The proposed joint analysis allows for a reduced number of false positives and for a reduced computational complexity. The algorithms are tested on data captured during real basketball games. The experimental results clearly show the advantages of the proposed approach.", keywords = "Basketball, detection, event, mobile, video", author = "Francesco Cricri and Sujeet Mate and Curcio, {Igor D D} and Moncef Gabbouj", note = "EXT={"}Curcio, Igor D D{"} EXT={"}Mate, Sujeet{"}", year = "2015", month = "2", day = "5", doi = "10.1109/ISM.2014.67", language = "English", isbn = "978-1-4799-4312-8", pages = "63--70", booktitle = "Proceedings - 2014 IEEE International Symposium on Multimedia, ISM 2014", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@article{32c7a133aa4246d89e333956fe0b123f, title = "Fault tolerant control architecture design for mobile manipulation in scientific facilities", abstract = "This paper describes one of the challenging issues implied by scientific infrastructures on a mobile robot cognition architecture. For a generally applicable cognition architecture, we study the dependencies and logical relations between several tasks and subsystems. The overall view of the software modules is described, including their relationship with a fault management module that monitors the consistency of the data flow among the modules. The fault management module is the solution of the deliberative architecture for the single point failures, and the safety anchor is the reactive solution for the faults by redundant equipment. In addition, a hardware architecture is proposed to ensure safe robot movement as a redundancy for the cognition of the robot. The method is designed for a four-wheel steerable (4WS) mobile manipulator (iMoro) as a case study.", keywords = "Architecture design, Autonomous vehicle drive, Cognition, Mobile robot, Remote handling", author = "{M. Aref}, Mohammad and Reza Oftadeh and Reza Ghabcheloo and Jouni Mattila", year = "2015", month = "1", day = "29", doi = "10.5772/60038", language = "English", volume = "12", journal = "international Journal of Advanced Robotic Systems", issn = "1729-8806", publisher = "InTech", number = "4", }
@inproceedings{d23a628d669b49eabce37248c9cfb644, title = "Classification of iPSC colony images using hierarchical strategies with support vector machines", abstract = "In this preliminary research we examine the suitability of hierarchical strategies of multi-class support vector machines for classification of induced pluripotent stem cell (iPSC) colony images. The iPSC technology gives incredible possibilities for safe and patient specific drug therapy without any ethical problems. However, growing of iPSCs is a sensitive process and abnormalities may occur during the growing process. These abnormalities need to be recognized and the problem returns to image classification. We have a collection of 80 iPSC colony images where each one of the images is prelabeled by an expert to class bad, good or semigood. We use intensity histograms as features for classification and we evaluate histograms from the whole image and the colony area only having two datasets. We perform two feature reduction procedures for both datasets. In classification we examine how different hierarchical constructions effect the classification. We perform thorough evaluation and the best accuracy was around 54{\%} obtained with the linear kernel function. Between different hierarchical structures, in many cases there are no significant changes in results. As a result, intensity histograms are a good baseline for the classification of iPSC colony images but more sophisticated feature extraction and reduction methods together with other classification methods need to be researched in future.", author = "Henry Joutsijoki and Jyrki Rasku and Markus Haponen and Ivan Baldin and Yulia Gizatdinova and Michelangelo Paci and Jyri Saarikoski and Kirsi Varpa and Harri Siirtola and Jorge {\'A}valos-Salguero and Kati Iltanen and Jorma Laurikkala and Kirsi Penttinen and Jari Hyttinen and Katriina Aalto-Set{\"a}l{\"a} and Martti Juhola", year = "2015", month = "1", day = "13", doi = "10.1109/CIDM.2014.7008152", language = "English", isbn = "9781479945191", pages = "86--92", booktitle = "IEEE SSCI 2014 - 2014 IEEE Symposium Series on Computational Intelligence - CIDM 2014: 2014 IEEE Symposium on Computational Intelligence and Data Mining, Proceedings", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@article{6fde3c0ad031480981eedd396ca933aa, title = "Image database TID2013: Peculiarities, results and perspectives", abstract = "This paper describes a recently created image database, TID2013, intended for evaluation of full-reference visual quality assessment metrics. With respect to TID2008, the new database contains a larger number (3000) of test images obtained from 25 reference images, 24 types of distortions for each reference image, and 5 levels for each type of distortion. Motivations for introducing 7 new types of distortions and one additional level of distortions are given; examples of distorted images are presented. Mean opinion scores (MOS) for the new database have been collected by performing 985 subjective experiments with volunteers (observers) from five countries (Finland, France, Italy, Ukraine, and USA). The availability of MOS allows the use of the designed database as a fundamental tool for assessing the effectiveness of visual quality. Furthermore, existing visual quality metrics have been tested with the proposed database and the collected results have been analyzed using rank order correlation coefficients between MOS and considered metrics. These correlation indices have been obtained both considering the full set of distorted images and specific image subsets, for highlighting advantages and drawbacks of existing, state of the art, quality metrics. Approaches to thorough performance analysis for a given metric are presented to detect practical situations or distortion types for which this metric is not adequate enough to human perception. The created image database and the collected MOS values are freely available for downloading and utilization for scientific purposes.", keywords = "Image denoising, Image lossy compression, Image visual quality metrics", author = "Nikolay Ponomarenko and Lina Jin and Oleg Ieremeiev and Vladimir Lukin and Karen Egiazarian and Jaakko Astola and Benoit Vozel and Kacem Chehdi and Marco Carli and Federica Battisti and {Jay Kuo}, {C. C.}", year = "2015", month = "1", day = "1", doi = "10.1016/j.image.2014.10.009", language = "English", volume = "30", pages = "57--77", journal = "Signal Processing: Image Communication", issn = "0923-5965", publisher = "Elsevier", }
@inproceedings{245ade1466a841078117da25a2fe97ab, title = "PaaSword: A holistic data privacy and security by design framework for cloud services", abstract = "The valuable transformation of organizations that adopt cloud computing is indisputably accompanied by a number of security threats that should be considered. In this paper, we outline significant security challenges presented when migrating to a cloud environment and propose PaaSword-a novel holistic, data privacy and security by design, framework that aspires to alleviate them. The envisaged framework intends to maximize and fortify the trust of individual, professional and corporate users to cloud services. Specifically, PaaSword involves a context-aware security model, the necessary policies enforcement and governance mechanisms along with a physical distribution, encryption and query middleware, aimed at facilitating the implementation of secure and transparent cloud-based applications.", keywords = "Cloud Computing, Context-aware Security, Data Privacy, Security by Design, Symmetric Searchable Encryption", author = "Yiannis Verginadis and Antonis Michalas and Panagiotis Gouvas and Gunther Schiefer and Gerald H{\"u}bsch and Iraklis Paraskakis", year = "2015", month = "1", day = "1", language = "English", pages = "206--213", booktitle = "CLOSER 2015 - 5th International Conference on Cloud Computing and Services Science, Proceedings", publisher = "SCITEPRESS", }
@article{dcd60e23db1c45aeab39273a6c41bbd1, title = "Social behavior in bacterial nanonetworks: Challenges and opportunities", abstract = "Molecular communication holds the promise to enable communication between nanomachines with a view to increasing their functionalities and opening up new possible applications. Due to some of the biological properties, bacteria have been proposed as a possible information carrier for molecular communication, and the corresponding communication networks are known as bacterial nanonetworks. The biological properties include the ability for bacteria to mobilize between locations and carry the information encoded in deoxyribonucleic acid molecules. However, similar to most organisms, bacteria have complex social properties that govern their colony. These social characteristics enable the bacteria to evolve through various fluctuating environmental conditions by utilizing cooperative and non-cooperative behaviors. This article provides an overview of the different types of cooperative and non-cooperative social behavior of bacteria. The challenges (due to non-cooperation) and the opportunities (due to cooperation) these behaviors can bring to the reliability of communication in bacterial nanonetworks are also discussed. Finally, simulation results on the impact of bacterial cooperative social behavior on the end-to-end reliability of a single-link bacterial nanonetwork are presented. The article concludes by highlighting the potential future research opportunities in this emerging field.", author = "Monowar Hasan and Ekram Hossain and Sasitharan Balasubramaniam and Yevgeni Koucheryavy", year = "2015", month = "1", day = "1", doi = "10.1109/MNET.2015.7018200", language = "English", volume = "29", pages = "26--34", journal = "IEEE Network", issn = "0890-8044", publisher = "Institute of Electrical and Electronics Engineers", number = "1", }
@article{24dc5632193f42e98fcbcde532564fc1, title = "Analytical model in discrete time for cross-layer video communication over LTE", abstract = "Since video traffic is resource intensive, it is a challenging issue to stream video over low bandwidth networks, whereas video communication over LTE becomes an open research topic nowadays due to LTE’s high throughput capabilities. Indeed, video transmission requires low delay, and wireless channel is time-varying, which result in a scenario when a layer-separated design is replaced by a Cross-Layer Adaptation (CLA) principle. In this paper an efficient analytical model that evaluates the behavior of the downlink LTE channel with CLA is presented. To the best of our knowledge, this is the first time an analytical model using CLA principle has been devised that covers both the transmission process from the eNB to the User Equipment (UE) at the first phase and video decoding process at the UE at the second phase. In order to ensure the cross-layer adaptation in the model, the arrival rate varies based on the received video request, whereas the service probability changes according to the channel quality indicator sent from the UE. In the experimental part the analysis of the main performance measures found from the stationary distribution is conducted.", keywords = "cross-layer adaptation, DASH, downlink, LTE, OFDMA, queuing system, stationary distribution", author = "T. Efimushkina and M. Gabbouj and K. Samuylov", year = "2015", doi = "10.3103/S0146411614060029", language = "English", volume = "48", pages = "345--357", journal = "Automatic Control and Computer Sciences", issn = "0146-4116", publisher = "MAIK Nauka/Interperiodica", number = "6", }
@article{dfda631ca8d04dd8ab377316e990b939, title = "Cultural influence on online community use: A cross-cultural study on online exercise diary users of three nationalities", abstract = "This study investigates the influence of culture on the use of a website intended for tracking exercise activities. The data was collected using an online survey with 258 respondents from three national backgrounds: Germany, the USA and Spain. In the analysis, the focus was on determining whether users' cultural background impacts their use and perception of the site, especially as concerns social networking and the sharing of content. The Spanish were most interested in social networking, collaboration and sharing content with others, whereas the German participants were the least interested in these activities. The applicability of Hofstede's cultural theory in the explanation of differences between national cultures in online community use is discussed.", keywords = "Cross-cultural research, Health and wellness applications, Online communities, SNSs, Social network sites", author = "Sanna Malinen and Piia Nurkka", note = "EXT={"}Malinen, Sanna{"}", year = "2015", doi = "10.1504/IJWBC.2015.068539", language = "English", volume = "11", pages = "153--169", journal = "International Journal of Web Based Communities", issn = "1477-8394", publisher = "Inderscience", number = "2", }
@inproceedings{d342f509e2f54791b440b8201159bbf7, title = "Designing an Unobtrusive Analytics Framework for Monitoring Java Applications", abstract = "In software development, attention has recently been placed on understanding users and their interactions with systems. User studies, practices such as A/B testing, and frameworks such as Google Analytics that gather data on production use have become common approaches in particular in the context of the Web, where it is easy to perform frequent updates as new needs emerge. However, when considering installable desktop applications, the situation gets more complex. While analytics facilities are still needed, they should address business logic, not generic traffic as is the case with many web sites. Moreover, analytics should be unobtrusive, and not have a high impact on the evolution of the actual application; thus, analytics should be treated as an add-on, as the target system may already exist. Finally, the instrumentation of features that are observed should be easy and ﬂexible, but the provided mechanisms should be expressive enough for many use cases. In this paper, we examine different alternatives for implementing such monitoring mechanisms, and report results from an experiment with Vaadin, a web framework based on Java and Google Web Toolkit, GWT.", keywords = "software engineering, software development, case study, software usage data, software analytics", author = "Sampo Suonsyrj{\"a} and Tommi Mikkonen", year = "2015", doi = "10.1007/978-3-319-24285-9_11", language = "English", isbn = "978-3-319-24284-2", volume = "230", series = "Lecture Notes in Business Information Processing", publisher = "Springer International Publishing", pages = "160--175", editor = "{Kobyliński }, Andrzej and Beata Czarnacka-Chrobot and Jarosław Świerczek", booktitle = "Software Measurement", }
@article{abe28bc30e0f477b8c04b75b0193d237, title = "Distant speech separation using predicted time-frequency masks from spatial features", abstract = "Speech separation algorithms are faced with a difficult task of producing high degree of separation without containing unwanted artifacts. The time-frequency (T-F) masking technique applies a real-valued (or binary) mask on top of the signal's spectrum to filter out unwanted components. The practical difficulty lies in the mask estimation. Often, using efficient masks engineered for separation performance leads to presence of unwanted musical noise artifacts in the separated signal. This lowers the perceptual quality and intelligibility of the output. Microphone arrays have been long studied for processing of distant speech. This work uses a feed-forward neural network for mapping microphone array's spatial features into a T-F mask. Wiener filter is used as a desired mask for training the neural network using speech examples in simulated setting. The T-F masks predicted by the neural network are combined to obtain an enhanced separation mask that exploits the information regarding interference between all sources. The final mask is applied to the delay-and-sum beamformer (DSB) output. The algorithm's objective separation capability in conjunction with the separated speech intelligibility is tested with recorded speech from distant talkers in two rooms from two distances. The results show improvement in instrumental measure for intelligibility and frequency-weighted SNR over complex-valued non-negative matrix factorization (CNMF) source separation approach, spatial sound source separation, and conventional beamforming methods such as the DSB and minimum variance distortionless response (MVDR).", keywords = "Beamforming, Microphone arrays, Neural networks, Speech separation, Time-frequency masking", author = "Pasi Pertil{\"a} and Joonas Nikunen", year = "2015", doi = "10.1016/j.specom.2015.01.006", language = "English", volume = "68", pages = "97--106", journal = "Speech Communication", issn = "0167-6393", publisher = "Elsevier", }
@article{52ae35c1608f417db10018f7c73d339e, title = "Dynamic text presentation in print interpreting - An eye movement study of reading behaviour", abstract = "Print interpreting supports people with a hearing disability by giving them access to spoken language. In print interpreting, the interpreter types the spoken text in real time for the hard-of-hearing client to read. This results in dynamic text presentation. An eye movement study was conducted to compare two types of dynamic text presentation formats in print interpreting: letter-by-letter and word-by-word. Gaze path analysis with 20 hearing participants showed different types of reading behaviour during reading of two pieces of text in these two presentation formats. Our analysis revealed that the text presentation format has a significant effect on reading behaviour. Rereading and regressions occurred significantly more often with the word-by-word format than with the letter-by-letter format. We also found a significant difference between the number of regressions starting at the words that end a sentence and that of regressions starting at all other words. The frequency of rereading was significantly higher for incorrectly typed or abbreviated words than for the other words. Analysis of the post-test questionnaire found almost equal acceptance of the word-by-word and letter-by-letter formats by the participants. A follow-up study with 18 hard-of-hearing participants showed a similar trend in results. The findings of this study highlight the importance of developing print interpreting tools that allow the interpreter and the client to choose the options that best facilitate the communication. They also bring up the need to develop new eye movement metrics for analysing the reading of dynamic text, and provide first results on a new dynamic presentation context.", keywords = "Dynamic text presentation, Eye movements, Print interpreting, Reading, Regressions", author = "Selina Sharmin and Oleg Špakov and R{\"a}ih{\"a}, {Kari Jouko}", year = "2015", doi = "10.1016/j.ijhcs.2015.01.010", language = "English", volume = "78", pages = "17--30", journal = "International Journal of Human-Computer Studies", issn = "1071-5819", publisher = "Elsevier", }
@article{642db896b1a348a592a9ac9280b51fe4, title = "Majorization-minimization for manifold embedding", abstract = "Nonlinear dimensionality reduction by manifold embedding has become a popular and powerful approach both for visualization and as preprocessing for predictive tasks, but more efficient optimization algorithms are still crucially needed. Majorization-Minimization (MM) is a promising approach that monotonically decreases the cost function, but it remains unknown how to tightly majorize the manifold embedding objective functions such that the resulting MM algorithms are efficient and robust. We propose a new MM procedure that yields fast MM algorithms for a wide variety of manifold embedding problems. In our majorization step, two parts of the cost function are respectively upper bounded by quadratic and Lipschitz surrogates, and the resulting upper bound can be minimized in closed form. For cost functions amenable to such QL-majorization, the MM yields monotonic improvement and is efficient: In experiments, the newly developed MM algorithms outperformed five state-ofthe-art optimization approaches in manifold embedding tasks.", author = "Zhirong Yang and Jaakko Peltonen and Samuel Kaski", year = "2015", language = "English", volume = "38", pages = "1088--1097", journal = "Journal of Machine Learning Research", issn = "1532-4435", publisher = "Journal of Machine Learning Research", }
@article{3b26b4714f904d3d8af017aa042d3c38, title = "On constructibility and unconstructibility of LTS operators from other LTS operators", abstract = "An LTS operator can be constructed from a set of LTS operators up to an equivalence if and only if there is an LTS expression that only contains operators from the set and whose result is equivalent to the result of the operator. In this publication this idea is made precise in the context where each LTS has an alphabet of its own and the operators may depend on the alphabets. Then the extent to which LTS operators are constructible is studied. Most, if not all, established LTS operators have the property that each trace of the result arises from the execution of no more than one trace of each of its argument LTSs, and similarly for infinite traces. All LTS operators that have this property and satisfy some other rather weak regularity properties can be constructed from parallel composition and hiding up to the equivalence that compares the alphabets, traces, and infinite traces of the LTSs. Furthermore, a collection of other miscellaneous constructibility and unconstructibility results is presented.", author = "Antti Valmari", year = "2015", doi = "10.1007/s00236-015-0217-2", language = "English", volume = "52", pages = "207--234", journal = "Acta Informatica", issn = "0001-5903", publisher = "Springer Verlag", number = "2-3", }
@article{6dbd4a937f1746e59776aa695f114a1a, title = "Quality measures for improving technology trees", abstract = "The quality of technology trees in digital games can be improved by adjusting their structural and quantitative properties. Therefore, there is a demand for recognizing and measuring such properties. Part of the process can be automated; there are properties measurable by computers, and analyses based on the results (and visualizations of them) may help to produce significantly better technology trees, even practically without extra workload for humans. In this paper, we introduce useful technology tree properties and novel measuring features implemented into our sofware tool for manipulating technology trees.", author = "Heinim{\"a}ki, {Teemu J.} and Tapio Elomaa", year = "2015", doi = "10.1155/2015/975371", language = "English", volume = "2015", journal = "International Journal of Computer Games Technology", issn = "1687-7047", publisher = "Hindawi Publishing Corporation", }
@article{8d6527601f9740bba69bd89e56757c7c, title = "Subjective evaluation of Super Multi-View compressed contents on high-end light-field 3D displays", abstract = "Super Multi-View (SMV) video content is composed of tens or hundreds of views that provide a light-field representation of a scene. This representation allows a glass-free visualization and eliminates many causes of discomfort existing in current available 3D video technologies. Efficient video compression of SMV content is a key factor for enabling future 3D video services. This paper first compares several coding configurations for SMV content and several inter-view prediction structures are also tested and compared. The experiments mainly suggest that large differences in coding efficiency can be observed from one configuration to another. Several ratios for the number of coded and synthesized views are compared, both objectively and subjectively. It is reported that view synthesis significantly affects the coding scheme. The amount of views to skip highly depends on the sequence and on the quality of the associated depth maps. Reported ranges of bitrates required to obtain a good quality for the tested SMV content are realistic and coherent with future 4. K/8. K needs. The reliability of the PSNR metric for SMV content is also studied. Objective and subjective results show that PSNR is able to reflect increase or decrease in subjective quality even in the presence of synthesized views. However, depending on the ratio of coded and synthesized views, the order of magnitude of the effective quality variation is biased by PSNR. Results indicate that PSNR is less tolerant to view synthesis artifacts than human viewers. Finally, preliminary observations are initiated. First, the light-field conversion step does not seem to alter the objective results for compression. Secondly, the motion parallax does not seem to be impacted by specific compression artifacts. The perception of the motion parallax is only altered by variations of the typical compression artifacts along the viewing angle, in cases where the subjective image quality is already low. To the best of our knowledge, this paper is the first to carry out subjective experiments and to report results of SMV compression for light-field 3D displays. It provides first results showing that improvement of compression efficiency is required, as well as depth estimation and view synthesis algorithms improvement, but that the use of SMV appears realistic according to next generation compression technology requirements.", keywords = "3D, Light-field, Subjective evaluation, Super Multi-View, Video coding, Video compression", author = "Antoine Dricot and Joel Jung and Marco Cagnazzo and B{\'e}atrice Pesquet and Fr{\'e}d{\'e}ric Dufaux and P{\'e}ter Kov{\'a}cs and Adhikarla, {Vamsi Kiran}", year = "2015", doi = "10.1016/j.image.2015.04.012", language = "English", volume = "39", pages = "369–385", journal = "Signal Processing: Image Communication", issn = "0923-5965", publisher = "Elsevier", number = "Part B", }
@article{555db79c08cf4fc4b24791a63cfdd92a, title = "Schoolchildren's user experiences on a physical exercise game utilizing lighting and audio", abstract = "Motivated by the troubling news on decreased exercise amount and increased obesity among children and adolescents, we investigated the possibilities of interactive lighting technology in encouraging children to participate in physical exercise in schools. We have created a story-driven physical exercise game based on light and sound utilizing a reasonably priced technological setup. The game has been evaluated with several groups of schoolchildren during physical education classes. The results show that a physical exercise game enhanced with lighting and audio keeps schoolchildren motivated both mentally and physically even after several playtimes. In subjective evaluations, participants still found the story of the game interesting after three playtimes, and were eager to exercise this way again.", keywords = "Exergaming, Interactive lighting, Physical education, Schoolchildren, Storytelling, User experience", author = "Tuuli Keskinen and Jaakko Hakulinen and Markku Turunen and Tomi Heimonen and Antti Sand and Janne Paavilainen and Jaana Parviainen and Sari Yrj{\"a}n{\"a}inen and Frans M{\"a}yr{\"a} and Jussi Okkonen and Roope Raisamo", year = "2014", month = "12", day = "1", doi = "10.1016/j.entcom.2014.08.009", language = "English", volume = "5", pages = "475--484", journal = "Entertainment Computing", issn = "1875-9521", publisher = "Elsevier", number = "4", }
@inproceedings{64cd68c5bacf4269b50e94b2ae62ae0d, title = "Goofy Mus, grumpy Mur and dirty Muf: Talking playful seats with personalities", abstract = "The article discusses the concept of MurMur Moderators, talking playful seats designed to facilitate playful atmosphere and creativity at office environments. The concept of MurMur Moderators consists of five different personalities, grumpy Mur, goofy Mus, mellow Muh, sensitive Mut and shy Mum. The article describes the experiences and reactions to two personalities, Mus and Mur. Further, a sixth personality, Muf, consisting of rejected, provocative features is detailed. Consequently, the paper discusses play preferences, affordances and thresholds in connection to adult play. These will be the focus of future research by the authors.", keywords = "Adult play, Interactive furniture, Narrative, Personas, Playful office", author = "Annakaisa Kultima and Timo Nummenmaa and Heikki Tyni and Kati Alha and Frans Mayra", year = "2014", month = "11", day = "11", doi = "10.1145/2693787.2693790", language = "English", volume = "11-14-November-2014", booktitle = "ACE 2014 - 11th Advances in Computer Entertainment Technology Conference, Workshops Proceedings", publisher = "Association for Computing Machinery", }
@inproceedings{6b334e28f7c642fca0e869d7729fe563, title = "Information wall: Evaluation of a gesture-controlled public display", abstract = "Public displays that allow users to interact with them through mid-air gestures are still relatively rare, as many applications rely on touch-based interaction. This paper introduces Information Wall, a gesture-controlled public information display that provides multi-user access to contextually relevant local information using remote pointing and mid-air gestures. The application has been studied in two settings: a lab-based user study and several short-term deployments. Based on our results, we present practical guidelines for gesture-controlled public display design.", keywords = "Gestures, Mid-air pointing, Pervasive displays, Public displays, User study", author = "Ville M{\"a}kel{\"a} and Tomi Heimonen and Matti Luhtala and Markku Turunen", year = "2014", month = "11", day = "11", doi = "10.1145/2677972.2677998", language = "English", volume = "2014-November", pages = "228--231", booktitle = "ACE 2014 - 11th Advances in Computer Entertainment Technology Conference, Proceedings", publisher = "Association for Computing Machinery", }
@inproceedings{f9c91db1d61d46ad96b8749a691b551b, title = "Body-touching: An embodied interaction technique for health information systems in developing regions", abstract = "We present a study of using embodied health information system for developing regions focusing on users not familiar with technology. We designed and developed a health information system with two gesture-based selection techniques: pointing to a screen and touching one's own body part. We evaluated the prototype in user study with 37 semi-literate and literate participants. Our results indicate a clear preference (76{\%}) for touching in the healthcare domain. Based on our observations and user feedback, we present four design guidelines for developing embodied systems for the developing world: designing bodycentric interaction to overcome literacy and technological proficiency barriers, addressing the misconceptions of system behaviors with users not familiar with technology, understanding effects of cultural constraints on interaction, and utilizing interactive virtual avatars to connect with the users.", keywords = "Body-centric interaction, Embodied interaction, gesture-based interaction, HCI4D, Health information systems, Information access", author = "Sumita Sharma and Saurabh Srivastava and Keyur Sorathia and Jaakko Hakulinen and Tomi Heimonen and Markku Turunen and Nitendra Rajput", year = "2014", month = "11", day = "4", doi = "10.1145/2676467.2676514", language = "English", pages = "49--56", booktitle = "MINDTREK 2014 - Proceedings of the 18th International Academic MindTrek Conference: {"}Media Business, Management, Content and Services{"}", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{f2de4d8088664a4eafc9300a2b42f84d, title = "DYNAMO sound engine - Exploring the aesthetics of dynamic sound interactions", abstract = "This paper outlines the design and development process of the Dynamic Audio Motion (Dynamo) concept. The Dynamo audio engine was developed for driving dynamic sound interaction states via custom made finite state machine. Further, a generative sound design approach was employed for creating sonic and musical structures. Designed dynamic sound interactions were tested in an embodied information wall application with endusers. During the testing situation, end-users engaged in a reflective creation process providing valuable insight of their experiences of using the system. In this paper we present key questions driving the research, theoretical background, research approach, an audio engine development process, and end-user research activities. The results indicate that dynamic sound interactions supported people's personal, emotional, and creative needs in the design context.", keywords = "Aesthetic experience, Artistic interfaces, Dynamic sound interaction, Multimodal interaction, Musicalization, Procedural sound design, Sonic interaction design", author = "Matti Luhtala and Tomi Heimonen and Ville M{\"a}kel{\"a} and Tuuli Keskinen and Markku Turunen and Santeri Saarinen", year = "2014", month = "11", day = "4", doi = "10.1145/2676467.2676522", language = "English", pages = "159--166", booktitle = "MINDTREK 2014 - Proceedings of the 18th International Academic MindTrek Conference: {"}Media Business, Management, Content and Services{"}", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{f1ff6a8e0b514bf384a18a8cd3fba0b3, title = "Email intensity, productivity and control in the knowledge worker's performance on the desktop", abstract = "Experiencing stress, disturbing interruptions, loss of ability to concentrate, hurry and challenges to meet tight deadlines at work are very common in working life. At the same time, while variety of digital communication channels like instant messaging, video calls and social networking sites are getting more popular in working life, email is still intensively utilized work communication media. The goal of the empirical field study analyzing daily desktop computing of knowledge workers was to analyze association between email intensity in work time spending and subjectively experienced quality of work performance. It was found that while intensive email use does not impair subjectively experienced productivity, it may harm ability to concentrate, may increase forgetfulness and inability to solve problems at work effectively. Copyright is held by the owner/author(s). Publication rights licensed to ACM.", keywords = "Email intensity, Knowledge work, Measurement, Productivity, Work performance", author = "Helj{\"a} Franssila and Jussi Okkonen and Reijo Savolainen", year = "2014", month = "11", day = "4", doi = "10.1145/2676467.2676513", language = "English", pages = "19--22", booktitle = "MINDTREK 2014 - Proceedings of the 18th International Academic MindTrek Conference: {"}Media Business, Management, Content and Services{"}", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{09c5318cf83c42078bd3fe89dab578b2, title = "Games and energy: Profiling power usage during play", abstract = "Computer gaming is a globally growing industry, with hundreds of millions of gaming-capable computers consuming an ever increasing amount of energy. Several of the world's most popular computer games tend to make a heavy use of computers' central processing units and/or graphics processing units. When such games execute on typical computers, for much of the time those components are kept in high energy-consuming states, regardless of what is happening in the game. We analyze this pattern of energy usage and we assess the scope for economizing on energy. The results presented also give insight into the energy implications of the hardware platform and operating systems used for hosting such games. We use the results to provide practical suggestions to both the industry and the gamers. Copyright is held by the owner/author(s). Publication rights licensed to ACM.", keywords = "Computer games, Energy measurement", author = "Salmela, {Jussi Matti} and Peter Thanisch and Olli Sotamaa and Tapio Niemi", year = "2014", month = "11", day = "4", doi = "10.1145/2676467.2676488", language = "English", pages = "192--199", booktitle = "MINDTREK 2014 - Proceedings of the 18th International Academic MindTrek Conference: {"}Media Business, Management, Content and Services{"}", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{4d9d832ac0f54aa89d8fbbcc9e229db9, title = "MurMur Moderators, the talking playful seats", abstract = "In this article we present the concept of MurMur Moderators, talking playful seats facilitating playful atmosphere and creativity at office environments. The article describes the design and technological composition of our first prototype, and our experiences exposing the concept to audiences at two science fairs in Italy (2013) and Finland (2014). This research has served as an informative pilot study, consequently directing our focus to the ways the accompanying narrative brings additional design value to the interactive seats. Our goal with the fairs was to investigate what are the preliminary audience reactions for the high level concept and how people interact with the initial prototype. The feedback was used for generating further ideas for ambient play and furniture-as-a-service, some of which carries on to future research and second prototype of the seat.", keywords = "Arduino, Audio feedback, Design research, Diy, Game studies, Internet of things, Playful furniture, Raspberry pi", author = "Timo Nummenmaa and Annakaisa Kultima and Heikki Tyni and Kati Alha", year = "2014", month = "11", day = "4", doi = "10.1145/2676467.2676505", language = "English", pages = "231--237", booktitle = "MINDTREK 2014 - Proceedings of the 18th International Academic MindTrek Conference: {"}Media Business, Management, Content and Services{"}", publisher = "Association for Computing Machinery, Inc", }
@article{d6700d9cd0b945a69e0c70b5a5115d62, title = "Discriminant Bag of Words based representation for human action recognition", abstract = "In this paper we propose a novel framework for human action recognition based on Bag of Words (BoWs) action representation, that unifies discriminative codebook generation and discriminant subspace learning. The proposed framework is able to, naturally, incorporate several (linear or non-linear) discrimination criteria for discriminant BoWs-based action representation. An iterative optimization scheme is proposed for sequential discriminant BoWs-based action representation and codebook adaptation based on action discrimination in a reduced dimensionality feature space where action classes are better discriminated. Experiments on five publicly available data sets aiming at different application scenarios demonstrate that the proposed unified approach increases the codebook discriminative ability providing enhanced action classification performance.", keywords = "Bag of Words, Codebook learning, Discriminant learning", author = "Alexandros Iosifidis and Anastastios Tefas and Ioannis Pitas", year = "2014", month = "11", day = "1", doi = "10.1016/j.patrec.2014.07.011", language = "English", volume = "49", pages = "185--192", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@article{dbe5d9b3561f40bcb90341fb93249d95, title = "Kernel reference discriminant analysis", abstract = "Linear Discriminant Analysis (LDA) and its nonlinear version Kernel Discriminant Analysis (KDA) are well-known and widely used techniques for supervised feature extraction and dimensionality reduction. They determine an optimal discriminant space for (non)linear data projection based on certain assumptions, e.g. on using normal distributions (either on the input or in the kernel space) for each class and employing class representation by the corresponding class mean vectors. However, there might be other vectors that can be used for classes representation, in order to increase class discrimination in the resulted feature space. In this paper, we propose an optimization scheme aiming at the optimal class representation, in terms of Fisher ratio maximization, for nonlinear data projection. Compared to the standard approach, the proposed optimization scheme increases class discrimination in the reduced-dimensionality feature space and achieves higher classification rates in publicly available data sets.", keywords = "Kernel Discriminant Analysis, Kernel Spectral Regression, Optimized class representation", author = "Alexandros Iosifidis and Anastastios Tefas and Ioannis Pitas", year = "2014", month = "11", day = "1", doi = "10.1016/j.patrec.2014.06.013", language = "English", volume = "49", pages = "85--91", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", }
@inproceedings{edba740fc19b4f04be34faccf3a6bf95, title = "Effects of directional haptic and non-speech audio cues in a cognitively demanding navigation task", abstract = "Existing car navigation systems require visual or auditory attention. Providing the driver with directional cues could potentially increase safety. We conducted an experiment comparing directional haptic and non-speech audio cues to visual cueing in a navigation task. Participants (N=16) drove the Lane Change Test simulator with different navigational cues. The participants were to recognize the directional cue (left or right) by responding as fast as possible using a tablet. Reaction times and errors were measured. The participants were also interviewed about the different cues and filled up the NASA-TLX questionnaire. The results showed that in comparison to visual cues all the other cues were reacted to significantly faster. Haptic only cueing resulted in the most errors, but it was evaluated as the most pleasant and the least physically demanding. The results suggest that non-visual cueing could improve safety. Copyright is held by the owner/author(s).", keywords = "Car navigation, Directional cues, Haptic stimuli, Tactile displays", author = "Tomi Nukarinen and Roope Raisamo and Ahmed Farooq and Grigori Evreinov and Veikko Surakka", year = "2014", month = "10", day = "26", doi = "10.1145/2639189.2639231", language = "English", pages = "61--64", booktitle = "Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{6b6da214a6074905826dff85694dde11, title = "Effects of haptic feedback on gaze based auto scrolling", abstract = "Eye tracking enables automatic scrolling based on natural viewing behavior. We were interested in the effects of haptic feedback on gaze behavior and user experience. We conducted an experiment where haptic feedback was used to forewarn the reader that their gaze had entered an active scrolling area. Results show no statistical differences between conditions with or without haptic feedback on task time or gaze behavior. However, user experience varied a lot. Some participants were not able to associate the haptics and the scrolling. Those who understood the connection found the haptic feedback useful. Further research is required to find out a delay between the forewarning and the start of scrolling that is short enough to make the association but yet long enough to support the feeling of control and enjoyable user experience. Copyright is held by the owner/author(s).", keywords = "Eye tracking, Gaze input, Haptics, Vibrotactile feedback", author = "Karoliina K{\"a}ki and Oleg Špakov and P{\"a}ivi Majaranta and Jari Kangas", year = "2014", month = "10", day = "26", doi = "10.1145/2639189.2670247", language = "English", pages = "947--950", booktitle = "Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{7600f3fc57814182a0ee6d481321ceb1, title = "Gaze-contingent scrolling and reading patterns", abstract = "An automatic technique that scrolls the window content while the user is reading the text in the window has been implemented. Scrolling is triggered by gaze moving outside the reader's preferred reading zone. The reading patterns instigated by automatic scrolling are analyzed both quantitatively and using gaze path visualizations. Automatic scrolling is shown to result in smooth reading activity.", keywords = "Analysis of reading, Gaze-based scrolling", author = "R{\"a}ih{\"a}, {Kari Jouko} and Selina Sharmin", year = "2014", month = "10", day = "26", doi = "10.1145/2639189.2639242", language = "English", pages = "65--68", booktitle = "Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{6861637caf83445bbf7c3a41f5d37e4e, title = "Human-technology choreographies: Re-thinking body, movement and space in interaction design", abstract = "Bodily movements have traditionally had mostly instrumental value in interaction design. However, movements can also be given a central role in understanding behaviour and in designing technology for humans. This workshop is aiming at taking a fresh, movement-oriented look at the design and evaluation of technology in a wide variety of contexts. Copyright is held by the owner/author(s).", keywords = "Choreography, Embodiment, Interaction design, Lived space", author = "Antti Pirhonen and Jaana Parviainen and Kai Tuuri and Markku Turunen and Tomi Heimonen", year = "2014", month = "10", day = "26", doi = "10.1145/2639189.2654843", language = "English", pages = "841--844", booktitle = "Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{717f7b3bbb6648c699a4f7a3f79c8ae9, title = "Seniors and text messaging on mobile touchscreen phones", abstract = "We studied how senior citizens write and send text messages on their own mobile phone and two touchscreen smartphones. Each participant participated in three training sessions and wrote messages with three phones. We found that the range of text entry performance among seniors is large. Average text entry rate in entering a 34 character test phrase was only 3.5 wpm. Further work to improve text messaging user interfaces for older un-skilled users is clearly needed. Copyright is held by the owner/author(s).", keywords = "Learning, Mobile phone, Older adult, Text messaging, Touchscreen", author = "Reetta {\"O}vermark and Poika Isokoski and Saila Ovaska", year = "2014", month = "10", day = "26", doi = "10.1145/2639189.2670252", language = "English", pages = "967--970", booktitle = "Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{7d1f46877cd643deb4401015fafbf5a4, title = "The fuzzy front end of experience design", abstract = "The basic idea behind Experience Design approach is that before ideating the solution, you define what experience to design for. This is a critical point in a design process, because the experience goal needs to be appropriate for the target context of use, in line with the brand experience, and meaningful to truly engage users. In the early phases of the experience design process, in the fuzzy front end, there are several sources that can guide experience goal setting. One important way is empathic understanding of the users' world and stepping into the users' shoes, but there are also other sources of insight and inspiration for setting the experiential goals such as brand promise, technology and societal trends as well as mere vision of renewal. In this workshop, we aim to collect examples of the fuzzy front end of the experience design process and analyze how the different sources of insight and inspiration influence experience goal setting. Copyright is held by the owner/author(s).", keywords = "Experience design, User experience, UX goals", author = "Eija Kaasinen and Heli V{\"a}{\"a}t{\"a}j{\"a} and Hannu Karvonen and Yichen Lu", note = "Contribution: organisation=tie,FACT1=1Portfolio EDEND: 2014-12-31Publisher name: ACM", year = "2014", month = "10", day = "26", doi = "10.1145/2639189.2654829", language = "English", isbn = "978-1-4503-2542-4", series = "Nordic conference on human-computer interaction", publisher = "ACM", pages = "797--800", booktitle = "Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational", }
@inproceedings{d160bbfb9ed14f48bec1c8c85c307474, title = "Using gaze gestures with haptic feedback on glasses", abstract = "Wearable computing devices are gradually becoming common, and head-mounted devices such as Google Glass are already available. These devices present new interaction challenges as the devices are usually small in size, and also the usage environment sets limitations on the available interaction modalities. One potential interaction method could be to use gaze for input and haptics for output with a head-worn device. We built a demonstration system to show how gaze gestures could be used to control a simple information application together with head area haptic feedback for gesture confirmation. The demonstration and experiences of early user studies have shown that users perceive such an input-output combination useful. Copyright is held by the owner/author(s).", keywords = "Gaze gestures, Gaze input, Haptics, Vibrotactile feedback, Wearable computing", author = "Jari Kangas and Deepak Akkil and Jussi Rantala and Poika Isokoski and P{\"a}ivi Majaranta and Roope Raisamo", year = "2014", month = "10", day = "26", doi = "10.1145/2639189.2670272", language = "English", pages = "1047--1050", booktitle = "Proceedings of the NordiCHI 2014: The 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational", publisher = "Association for Computing Machinery, Inc", }
@inproceedings{859c4510e9ec483a8786fddf159fa3b2, title = "Estimating software development effort based on phases", abstract = "Software development effort estimation is a very important issue in software engineering and several models have been defined to this end. In this paper, we carry out an empirical study on the estimation of software development effort broken down by phase, so that estimation can be used along the software development lifecycle. More specifically, our goal is twofold. At any given point in the software development lifecycle, we estimate the effort needed for the next phase. Also, we estimate the effort for the remaining part of the software development process. Our empirical study is based on historical data from the ISBSG database. The results show a set of statistically significant correlations between: (1) the effort spent in one phase and the effort spent in the following one, (2) the effort spent in a phase and the remaining effort, (3) the cumulative effort up to the current phase and the remaining effort. However, the results also show that these estimation models come with different degrees of goodness of fit. Finally, including further information, such as the functional size, does not significantly improve estimation quality.", keywords = "data driven estimation, isbsg, software estimation", author = "Valentina Lenarduzzi and Sandro Morasca and Davide Taibi", year = "2014", month = "10", day = "17", doi = "10.1109/SEAA.2014.54", language = "English", pages = "305--308", booktitle = "Proceedings - 40th Euromicro Conference Series on Software Engineering and Advanced Applications, SEAA 2014", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{ce01f6f006e74769bf160a5fb26e33d5, title = "Process configuration framework tool", abstract = "Organizations considering the adoption of new methods, techniques, or tools often face the problem of how to evaluate these systematically, thoroughly, and completely. In this work we present the Process Configuration Framework Tool, a web application based on the Reference Technology platform and aimed at helping organizations find empirical evidence in a specific context. These results will help decision makers to easily find existing methods, techniques, and tools in the appropriate context and make decisions based on empirical evidence.", keywords = "process improvement, process selection", author = "Philipp Diebold and Laurent Dieudonne and Davide Taibi", year = "2014", month = "10", day = "17", doi = "10.1109/SEAA.2014.28", language = "English", pages = "389--390", booktitle = "Proceedings - 40th Euromicro Conference Series on Software Engineering and Advanced Applications, SEAA 2014", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{10cdf72a03f44e118a8700b00113d1a5, title = "Patterns for controlling chaos in a startup", abstract = "A growing trend in industrial software engineering is that new software products and information services are developed under conditions of notable uncertainty. This is especially visible in startup enterprises which aim at new kinds of products and services in rapidly changing social web, where potential customers can quickly adopt new behavior. Special characteristics of the startups are lack of resources and funds, and startups may need to change direction fast. All these affect the software engineering practices used in the startups. Unfortunately almost 90 percent of all startups fail and goes bankrupt. There are probably indefinite numbers of reasons why startups fail. Failure might be caused by wrongly chosen software engineering practices or inconsiderate decision making. While there is no recipe for success, we argue that good practices that can help on the way to success can be identified from successful startups. In this paper, we present two patterns that startups can consider when entering the growth phase of the lifecycle.", keywords = "Lean start-up, Organizational patterns, Patterns, Software engineering, Start-up", author = "Veli-Pekka Eloranta", year = "2014", month = "4", day = "10", doi = "10.1145/2676680.2676682", language = "English", isbn = "9781450326605", volume = "2014-April", series = "ACM International Conference Proceeding Series", publisher = "Association for Computing Machinery", pages = "1--8", booktitle = "VikingPLoP 2014 Proceedings of the 8th Nordic Conference on Pattern Languages of Programs", }
@inproceedings{ae68b6bea9f14db7b7183faba2fb771e, title = "Two patterns for minimizing human resources in a startup", abstract = "In this paper, we describe two patterns that are part of a larger pattern language for software startup companies. These two particular patterns help startup companies to focus on the essential; the product itself and keeping their team intact and productive. In this way, the startup may operate with a sustainable team size.", keywords = "Lean startup, Organization, Organizational patterns, Patterns, Software engineering, Software product, Team", author = "Marko Lepp{\"a}nen", year = "2014", month = "4", day = "10", doi = "10.1145/2676680.2676686", language = "English", isbn = "9781450326605", booktitle = "VikingPLoP 2014 Proceedings of the 8th Nordic Conference on Pattern Languages of Programs (VikingPLoP)", publisher = "ACM", }
@article{b79fa02d3f184ed69d3d1cfcdcffa0ec, title = "Prediction models and techniques for Open Source Software projects: A systematic literature review", abstract = "Open Source Software (OSS) is currently a widely adopted approach to developing and distributing software. For effective adoption of OSS, fundamental knowledge of project development is needed. This often calls for reliable prediction models to simulate project evolution and to envision project future. These models provide help in supporting preventive maintenance and building quality software. This paper reports on a systematic literature survey aimed at the identification and structuring of research that offer prediction models and techniques in analyzing OSS projects. In this review, we systematically selected and reviewed 52 peer reviewed articles that were published between January, 2000 and March, 2013. The study outcome provides insight in what constitutes the main contributions of the field, identifies gaps and opportunities, and distills several important future research directions.", keywords = "Fault prediction, Open Source Software, OSS community, Prediction, Systematic literature review", author = "Syeed, {M. M Mahbubul} and Imed Hammouda and Tarja Syst{\"a}", note = "EXT={"}Hammouda, Imed{"}", year = "2014", month = "4", day = "1", doi = "10.4018/ijossp.2014040101", language = "English", volume = "5", pages = "1--39", journal = "International Journal of Open Source Software and Processes", issn = "1942-3926", publisher = "IGI Global", number = "2", }
@article{bdc1a415463c470793c9b63694e928f2, title = "Optimizing spatial and temporal reuse in wireless networks by decentralized partially observable markov decision processes", abstract = "The performance of medium access control (MAC) depends on both spatial locations and traffic patterns of wireless agents. In contrast to conventional MAC policies, we propose a MAC solution that adapts to the prevailing spatial and temporal opportunities. The proposed solution is based on a decentralized partially observable Markov decision process (DEC-POMDP), which is able to handle wireless network dynamics described by a Markov model. A DEC-POMDP takes both sensor noise and partial observations into account, and yields MAC policies that are optimal for the network dynamics model. The DEC-POMDP MAC policies can be optimized for a freely chosen goal, such as maximal throughput or minimal latency, with the same algorithm. We make approximate optimization efficient by exploiting problem structure: the policies are optimized by a factored DEC-POMDP method, yielding highly compact state machine representations for MAC policies. Experiments show that our approach yields higher throughput and lower latency than CSMA/CA based comparison methods adapted to the current wireless network configuration.", keywords = "decentralized POMDP, medium access control, multi-agent planning, Spatial reuse, wireless network", author = "Joni Pajarinen and Ari Hottinen and Jaakko Peltonen", year = "2014", month = "4", doi = "10.1109/TMC.2013.39", language = "English", volume = "13", pages = "866--879", journal = "IEEE Transactions on Mobile Computing", issn = "1536-1233", publisher = "Institute of Electrical and Electronics Engineers", number = "4", }
@article{647f0e6942794d68987b4c518815c5a2, title = "System integration for real-time mobile manipulation", abstract = "Mobile manipulators are one of the most complicated types of mechatronics systems. The performance of these robots in performing complex manipulation tasks is highly correlated with the synchronization and integration of their low-level components. This paper discusses in detail the mechatronics design of a four wheel steered mobile manipulator. It presents the manipulator's mechanical structure and electrical interfaces, designs low-level software architecture based on embedded PC-based controls, and proposes a systematic solution based on code generation products of MATLAB and Simulink. The remote development environment described here is used to develop real-time controller software and modules for the mobile manipulator under a POSIX-compliant, real-time Linux operating system. Our approach enables developers to reliably design controller modules that meet the hard real-time constraints of the entire low-level system architecture. Moreover, it provides a systematic framework for the development and integration of hardware devices with various communication mediums and protocols, which facilitates the development and integration process of the software controller. {\circledC} 2014 The Author(s). Licensee InTech.", keywords = "Autonomous vehicles, Mechatronic design, Mobile manipulators, Real-time systems", author = "Reza Oftadeh and Aref, {Mohammad M.} and Reza Ghabcheloo and Jouni Mattila", note = "Contribution: organisation=iha,FACT1=1Portfolio EDEND: 2014-05-30Publisher name: InTech Open Access Publisher", year = "2014", month = "3", day = "28", doi = "10.5772/58467", language = "English", volume = "11", journal = "international Journal of Advanced Robotic Systems", issn = "1729-8806", publisher = "InTech", number = "1", }
@article{ff301f9dc9d9461ea51530e263b0280b, title = "A computational approach to construct a multivariate complete graph invariant", abstract = "In this paper, we present a computational approach for finding complete graph invariants. Specifically, we generate exhaustive sets of connected, non-isomorphic graphs with 9 and 10 vertices and demonstrate that a 97-dimensional multivariate graph invariant is capable to distinguish each of the non-isomorphic graphs. Furthermore, in order to tame the computational complexity of the problem caused by the vast number of graphs, e.g., involving over 10 million networks with 10 vertices, we suggest a low-dimensional, iterative procedure that is based on highly discriminative individual graph invariants. We show that also this computational approach leads to a perfect discrimination. Overall, our numerical results prove the existence of such graph invariants for networks with 9 and 10 vertices. Furthermore, we show that our iterative approach has a polynomial time complexity.", keywords = "Information inequality, Quantitative graph theory, Random network model, Statistics", author = "Matthias Dehmer and Frank Emmert-Streib and Martin Grabner", year = "2014", month = "3", day = "1", doi = "10.1016/j.ins.2013.11.008", language = "English", volume = "260", pages = "200--208", journal = "Information Sciences", issn = "0020-0255", publisher = "Elsevier", }
@inproceedings{896f376e16bf4d3dbe44c8860b615bdf, title = "Developing novel multimodal interaction techniques for touchscreen in-vehicle infotainment systems", abstract = "Haptics has been an integral part of multimodal systems in Human Computer Interaction (HCI). The ability to touch and sense virtual components of any system has long been the holy grail of HCI, which is particularly useful in mission critical environments where other modalities are weakened by environmental noise. Haptics also compliments most modalities of interaction by reinforcing the intimate and personal aspect of interaction. Haptics becomes much more important in environments that prove to be far too noisy for audio feedback.The driving environment is one such area, which the addition of haptics is not just additive, but critical in HCI. However, most of the research on haptic feedback in the car has been conducted using vibro-tactile feedback. In this paper, we present a system in which we have developed a novel haptic feedback environment using pneumatic and vibrotactile technologies, to facilitate in carcommunication, using the In-vehicle Infotainment System. Our aim was to build on the user haptic perception and experience the advance multimodal interaction system by utilizing available feedback techniques in, in-car interaction. The qualitative results of our study show that haptic feedback has great potential for safety and communication use, but the difficulty in interpreting haptic signals requires additional translation means ('semantic linkages'), to support the right interpretation of the haptic information.", keywords = "haptic feedback, human computer iteraction, In-Vehicle Infotainment Systems, Multimodal Interaction, pneumatic feedback, tactile/vibro-tactile feedback", author = "Ahmed Farooq and Grigori Evreinov and Roope Raisamo and Erno M{\"a}kinen and Tomi Nukarinen and Majeed, {Atif Abdul}", year = "2014", month = "2", day = "2", doi = "10.1109/ICOSST.2014.7029317", language = "English", pages = "32--42", booktitle = "ICOSST 2014 - 2014 International Conference on Open Source Systems and Technologies, Proceedings", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{dc78a90db4424f9685915c9bb2d8c147, title = "Haptic user interface enhancement system for touchscreen based interaction: A novel system for multimodal interaction with touchscreen interfaces", abstract = "Touchscreens are becoming a more attractive interaction technology in our daily lives and they are quickly replacing most of the conventional user interface controls. The ability to continuously modify and reconfigure screen contacts is a valuable feature in any device, especially in mobile devices like smartphones and tablets, where every inch matters. Perhaps the most inviting aspect of touchscreens is their ability to detect gestures and recognize human activities. Unlike externally static interfaces with a dedicated input device, such as a keypad with discrete well-defined keys; most touch sensitive displays are embodied as a flat, stiff and ridged screen surface. As a result, touch sensitive displays are breaking down and do not follow either ergonomic rules and standards nor physiological and psychological models/concepts of the afferent flow information processing. This, in turn, means that these systems diminish perceptual and intuitive haptic feedback which hinders and sometime limits user interaction.This paper defines a Haptic User Interface Enhancement System (UIES) that transforms the conventionally flat and stiff touchscreen surfaces intoa haptically adaptive interaction hub which is not only able to provide generic vibrotactile stimulation for conformational haptic feedback but is able to guide the user though onscreen User Interface controls via kinetic feedback cues which includes components of forces and torques applied dynamically in the place of contact to the fingertips.", keywords = "Haptics, kenesthetic feedback, Multimodal Interaction, Touchscreen Interaction, Vibrotactile", author = "Ahmed Farooq and Grigori Evreinov and Roope Raisamo and Majeed, {Atif Abdul}", year = "2014", month = "2", day = "2", doi = "10.1109/ICOSST.2014.7029316", language = "English", pages = "25--31", booktitle = "ICOSST 2014 - 2014 International Conference on Open Source Systems and Technologies, Proceedings", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{03ffa8ccff3149a6ba03690a604eb9d9, title = "Symbol diversification of linux binaries", abstract = "In this paper, we advocate large-scale diversification as a method to protect operating systems and render malicious programs ineffective. The idea is to diversify all the indirect library entry points to the system calls on a specific computer. As a result, it becomes very difficult for a piece of malware to access resources. The diversification of indirect system call entry points in operating system libraries is unique for each computer. Therefore, a piece of malware no longer works on several computers and becomes incompatible with their environment. We also present a concrete diversification tool and results on successful diversification. We conclude that despite some challenges, our tool can successfully diversify symbols in binaries and associated libraries in order to protect the system from attacks.", author = "Samuel Lauren and Petteri Maki and Sampsa Rauti and Shohreh Hosseinzadeh and Sami Hyrynsalmi and Ville Leppanen", year = "2014", month = "1", day = "30", doi = "10.1109/WorldCIS.2014.7028170", language = "English", pages = "74--79", booktitle = "2014 World Congress on Internet Security, WorldCIS 2014", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{af084adfd5044bf7974e062a5f660ece, title = "Domain based storage protection with secure access control for the cloud", abstract = "Cloud computing has evolved from a promising concept to one of the fastest growing segments of the IT industry. However, many businesses and individuals continue to view cloud computing as a technology that risks exposing their data to unauthorized users. We introduce a data confidentiality and integrity protection mechanism for Infrastructure-as-a-Service (IaaS) clouds, which relies on trusted computing principles to provide transparent storage isolation between IaaS clients. We also address the absence of reliable data sharing mechanisms, by providing an XML-based language framework which enables clients of IaaS clouds to securely share data and clearly define access rights granted to peers. The proposed improvements have been prototyped as a code extension for a popular cloud platform.", keywords = "cloud computing, IaaS, security, storage protection", author = "Nicolae Paladi and Antonis Michalas and Christian Gehrmann", year = "2014", month = "1", day = "1", doi = "10.1145/2600075.2600082", language = "English", isbn = "9781450328050", pages = "35--42", booktitle = "SCC 2014 - Proceedings of the 2nd International Workshop on Security in Cloud Computing", publisher = "Association for Computing Machinery", }
@inproceedings{9848c7155345426bb0c75f21ac95b054, title = "The lord of the sense: A privacy preserving reputation system for participatory sensing applications", abstract = "Electronic devices we use on a daily basis collect sensitive information without preserving user's privacy. In this paper, we propose the lord of the sense (LotS), a privacy preserving reputation system for participatory sensing applications. Our system maintains the privacy and anonymity of information with the use of cryptographic techniques and combines voting approaches to support users' reputation. Furthermore, LotS maintains accountability by tracing back a misbehaving user while maintaining k-anonymity. A detailed security analysis is presented with the current advantages and disadvantages of our system.", keywords = "Anonymity, Distributed Sensing, Participatory Sensing, Privacy, Reputation Systems, Security, Urban Sensing", author = "Antonis Michalas and Nikos Komninos", year = "2014", month = "1", day = "1", doi = "10.1109/ISCC.2014.6912480", language = "English", booktitle = "2014 IEEE Symposium on Computers and Communications, ISCC 2014 - Proceedings", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{ee22b2f33af5478bbf90e7e9a93c70bd, title = "Controlled experiments comparing fault-tree-based safety analysis techniques", abstract = "The capability to model dynamic aspects of safety-critical systems, such as sequence or stochastic dependence of events, is one important requirement for safety analysis techniques. State Event Fault Tree Analysis, Dynamic Fault Tree Analyis, and Fault Tree Analysis combined with Markov Chains Analysis have been developed to fulfill these requirements, but they are still not widely accepted and used in practice. In order to investigate the reasons behind this low usage, we conducted two controlled experiments. The goal of the experiments was to analyze and compare applicability and efficiency in State Event Fault Tree analysis versus Dynamic Fault Tree Analyis and Fault Tree Analysis combined with Markov Chains Analysis. The results of both experiments show that, notwithstanding the power of State Event Fault Tree Analysis, Dynamic Fault Tree Analyis is rated by participants as more applicable and is more efficient compared to State Event Fault Tree Analysis, which, in turn, is rated as more applicable but is less efficient than Fault Tree Analysis combined with Markov Chains Analysis. Two of the reasons investigated are the complexity of the notations used and the lack of tool support. Based on these results, we suggest strategies for enhancing State Event Fault Tree Analysis to overcome its weaknesses and increase its applicability and efficiency in modeling dynamic aspects of safety-critical systems.", keywords = "Controlled experiment, Dynamic fault tree, Fault tree analysis, Markov chain, Safety-analysis, Safety-critical systems, State event fault tree", author = "Adrien Mouaffo and Davide Taibi and Kavyashree Jamboti", year = "2014", doi = "10.1145/2601248.2601255", language = "English", isbn = "9781450324762", booktitle = "18th International Conference on Evaluation and Assessment in Software Engineering, EASE 2014", publisher = "Association for Computing Machinery (ACM)", address = "United States", }
@inbook{9a7ccf65135243b8ac94dc0f749fff95, title = "Data-driven stream mining systems for computer vision", abstract = "In this chapter, we discuss the state of the art and future challenges in adaptive stream mining systems for computer vision. Adaptive stream mining in this context involves the extraction of knowledge from image and video streams in real-time, and from sources that are possibly distributed and heterogeneous. With advances in sensor and digital processing technologies, we are able to deploy networks involving large numbers of cameras that acquire increasing volumes of image data for diverse applications in monitoring and surveillance. However, to exploit the potential of such extensive networks for image acquisition, important challenges must be addressed in efficient communication and analysis of such data under constraints on power consumption, communication bandwidth, and end-to-end latency. We discuss these challenges in this chapter, and we also discuss important directions for research in addressing such challenges using dynamic, data-driven methodologies.", author = "Bhattacharyya, {Shuvra S.} and {Van Der Schaar}, Mihaela and Onur Atan and Cem Tekin and Kishan Sudusinghe", year = "2014", doi = "10.1007/978-3-319-09387-1_12", language = "English", volume = "68", series = "Advances in Computer Vision and Pattern Recognition", publisher = "SPRINGER-VERLAG LONDON LTD", pages = "249--264", booktitle = "Advances in Computer Vision and Pattern Recognition", }
@inproceedings{236474196b5c410f93e2f1420deb3613, title = "Gaze gestures and haptic feedback in mobile devices", abstract = "Anticipating the emergence of gaze tracking capable mobile devices, we are investigating the use of gaze as an input modality in handheld mobile devices. We conducted a study of combining gaze gestures with vibrotactile feedback. Gaze gestures were used as an input method in a mobile device and vibrotactile feedback as a new alternative way to give confirmation of interaction events. Our results show that vibrotactile feedback significantly improved the use of gaze gestures. The tasks were completed faster and rated easier and more comfortable when vibrotactile feedback was provided.", keywords = "Gaze interaction, Gaze tracking, Haptic feedback", author = "Jari Kangas and Deepak Akkil and Jussi Rantala and Poika Isokoski and P{\"a}ivi Majaranta and Roope Raisamo", year = "2014", doi = "10.1145/2556288.2557040", language = "English", isbn = "9781450324731", pages = "435--438", booktitle = "CHI 2014: One of a CHInd - Conference Proceedings, 32nd Annual ACM Conference on Human Factors in Computing Systems", publisher = "Association for Computing Machinery", }
@inproceedings{dedcb8aab58d4c82b5c3946b6215b03b, title = "Glasses with haptic feedback of gaze gestures", abstract = "We introduce eyeglasses that present haptic feedback when using gaze gestures for input. The glasses utilize vibrotactile actuators to provide gentle stimulation to three locations on the user's head. We describe two initial user studies that were conducted to evaluate the easiness of recognizing feedback locations and participants' preferences for combining the feedback with gaze gestures. The results showed that feedback from a single actuator was the easiest to recognize and also preferred when used with gaze gestures. We conclude by presenting future use scenarios that could benefit from gaze gestures and haptic feedback.", keywords = "Gaze gestures, Gaze input, Haptics, Vibrotactile feedback, Wearable computing", author = "Jussi Rantala and Poika Isokoski and Jari Kangas and Roope Raisamo and Deepak Akkil", year = "2014", doi = "10.1145/2559206.2581163", language = "English", isbn = "9781450324748", pages = "1597--1602", booktitle = "CHI EA 2014: One of a ChiNd - Extended Abstracts, 32nd Annual ACM Conference on Human Factors in Computing Systems", publisher = "Association for Computing Machinery", }
@article{e71d608f330f47f3bd0a57e9b2fb1625, title = "Head movement and facial expressions as game input", abstract = "This study aimed to develop and test a hands-free video game that utilizes information on the player's real-time face position and facial expressions as intrinsic elements of a gameplay. Special focus was given to investigating the user's subjective experiences in utilizing computer vision input in the game interaction. The player's goal was to steer a drunken character home as quickly as possible by moving their head. Additionally, the player could influence the behavior of game characters by using the facial expressions of frowning and smiling. The participants played the game with computer vision and a conventional joystick and rated the functionality of the control methods and their emotional and game experiences. The results showed that although the functionality of the joystick steering was rated higher than that of the computer vision method, the use of head movements and facial expressions enhanced the experiences of game playing in many ways. The participants rated playing with the computer vision technique as more entertaining, interesting, challenging, immersive, and arousing than doing so with a joystick. The results suggested that a high level of experienced arousal in the case of computer vision-based interaction may be a key factor for better experiences of game playing.", keywords = "Camera-based video game, Computer vision, Emotion, Face detection and tracking, Facial expression classification, Gameplay experience", author = "Mirja Ilves and Yulia Gizatdinova and Veikko Surakka and Esko Vankka", year = "2014", doi = "10.1016/j.entcom.2014.04.005", language = "English", volume = "5", pages = "147--156", journal = "Entertainment Computing", issn = "1875-9521", publisher = "Elsevier", number = "3", }
@inproceedings{fa372d5abee6463984f222df8b98bd42, title = "IntentRadar: Search user interface that anticipates user's search intents", abstract = "We introduce IntentRadar, an interactive search user interface that anticipates user's search intents by estimating them from user interaction. The estimated intents are represented as keywords and visualized on a radial layout that organizes the keywords as directions in the information space. IntentRadar assists users to direct their search by allowing to target relevance feedback on keywords by manipulating the position of the keywords on the radar. The system then learns and visualizes improved estimates of intents and retrieves documents corresponding to the present search intent estimate. IntentRadar has been shown to significantly improve users' task performance and the quality of retrieved information without compromising task execution time.", keywords = "Intent modeling, Interactive information retrieval, Search user interfaces, Visualization", author = "Tuukka Ruotsalo and Jaakko Peltonen and Eugster, {Manuel J A} and Dorota Glowacka and Aki Reijonen and Giulio Jacucci and Petri Myllym{\"a}ki and Samuel Kaski", year = "2014", doi = "10.1145/2559206.2574807", language = "English", isbn = "9781450324748", pages = "455--458", booktitle = "CHI EA 2014: One of a ChiNd - Extended Abstracts, 32nd Annual ACM Conference on Human Factors in Computing Systems", publisher = "Association for Computing Machinery", }
@inproceedings{851d543722bf41ff9ead84121579df82, title = "Layers of user expectations of future technologies: An early framework", abstract = "User's expectations are identified as a factor affecting the actual user experience in human-computer interaction. Considering the context of emerging and future technologies, users' expectations can become increasingly diverse, especially in terms of where they stem from. This paper presents an early framework for understanding different layers of expectations that people might have of technologies in the near future: for example, 'desires' and 'social and societal norms'. The framework provides understanding of the spectrum of user expectations and what different aspects of them could be identified in user inquiries and evaluations. For concretization and credibility of this work-in-progress framework, examples from recent research on user expectations of mobile augmented reality are provided.", keywords = "Anticipation, Emerging technologies, Expectation, Framework, Quality, User experience, User studies", author = "Thomas Olsson", year = "2014", doi = "10.1145/2559206.2581225", language = "English", isbn = "9781450324748", pages = "1957--1962", booktitle = "CHI EA 2014: One of a ChiNd - Extended Abstracts, 32nd Annual ACM Conference on Human Factors in Computing Systems", publisher = "Association for Computing Machinery", }
@article{6e14b69515a049c4986938e73d07da04, title = "Low-Power Reconfigurable Miniature Sensor Nodes for Condition Monitoring", abstract = "Wireless sensor networks (WSNs) are being deployed at an escalating rate for various application fields. The ever growing number of application areas requires a diverse set of algorithms with disparate processing needs. WSNs also need to adapt to prevailing energy conditions and processing requirements. The preceding reasons rule out the use of a single fixed design. Instead, a general purpose design that can rapidly be adapted to different conditions and requirements is desired. In lieu of the traditional inflexible wireless sensor node consisting of a separate micro-controller, radio transceiver, sensor array and energy storage, we propose a unified rapidly reconfigurable miniature sensor node, implemented with a transport triggered architecture processor on a low-power Flash FPGA. To our knowledge, this is the first study of its kind. The proposed approach does not solely concentrate on energy efficiency but a high emphasis is also put on the ease of development perspective. Power consumption and silicon area usage comparison based on solutions implemented using our novel rapid design approach for wireless sensor nodes are performed. The comparison is performed between 16-bit fixed point, 16-bit floating point and 32-bit floating point implementations. The implemented processors and algorithms are intended for rolling bearing condition monitoring, but can be fully extended for other applications as well.", keywords = "Application specific processors, Transport triggered architecture, Wireless sensor networks", author = "Teemu Nyl{\"a}nden and Jani Boutellier and Karri Nikunen and Jari Hannuksela and Olli Silv{\'e}n", year = "2014", doi = "10.1007/s10766-013-0302-5", language = "English", volume = "43", pages = "3--23", journal = "International Journal of Parallel Programming", issn = "0885-7458", publisher = "Springer Verlag", number = "1", }
@inproceedings{7196b0d9ca3a46fe8a0de8158ee4a13a, title = "Minimum Variance Extreme Learning Machine for human action recognition", abstract = "In this paper we propose an algorithm for Single-hidden Layer Feedforward Neural networks training. Based on the observation that the learning process of such networks can be considered to be a non-linear mapping of the training data to a high-dimensional feature space, followed by a data projection process to a low-dimensional space where classification is performed by a linear classifier, we extend the Extreme Learning Machine (ELM) algorithm in order to exploit the training data dispersion in its optimization process. The proposed Minimum Variance Extreme Learning Machine classifier is evaluated in human action recognition, where we compare its performance with that of other ELM-based classifiers, as well as the kernel Support Vector Machine classifier.", keywords = "Classification, Extreme Learning Machine, Human Action Recognition, Single-hidden Layer Feedforward Neural networks", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2014", doi = "10.1109/ICASSP.2014.6854640", language = "English", isbn = "9781479928927", pages = "5427--5431", booktitle = "ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings", publisher = "The Institute of Electrical and Electronics Engineers, Inc.", }
@inproceedings{9c707cab1714480890740e51e300bded, title = "Models for mobile application maintenance based on update history", abstract = "Good software development and particularly maintenance practices form an important factor for success in software business. If one wants to constantly produce new successful releases of the applications, a proper efficient software maintenance process is the key. In this work, we study data from mobile application maintenance to understand and conceptualize how mobile application maintenance takes place. Based on the data on release history, we deduce different mobile application maintenance models from the perspectives of maintenance scheduling and maintenance requirements.", keywords = "Maintenance model, Mobile application, Software maintenance, Software release", author = "Xiaozhou Li and Zheying Zhang and Jyrki Nummenmaa", year = "2014", language = "English", isbn = "9789897580307", pages = "212--217", booktitle = "ENASE 2014 - Proceedings of the 9th International Conference on Evaluation of Novel Approaches to Software Engineering", publisher = "SCITEPRESS", }
@inproceedings{0fb10f0a46794504b1620f485d799233, title = "On application of rational Discrete Short Time Fourier Transform in epileptic seizure classification", abstract = "This work deals with an adaptive and localized time-frequency representation of time-series signals based on rational functions. The proposed rational Discrete Short Time Fourier Transform (DSTFT) is used for extracting discriminative features in EEG data. We take the advantages of bagging ensemble learning and Alternating Decision Tree (ADTree) classifier to detect the seizure segments in presence of seizure-free segments. The effectiveness of different rational systems is compared with the classical Short Time Fourier Transform (STFT). The comparative study demonstrates that Malmquist-Takenaka rational system outperforms STFT while it can provide a tunable time-frequency representation of the EEG signals and less Mean Square Error (MSE) in the inverse transform. {\circledC} 2014 IEEE.", keywords = "EEG time series, Malmquist-Takenaka system, rational functions, seizure classification", author = "Peter Kov{\'a}cs and Kaveh Samiee and Moncef Gabbouj", note = "Contribution: organisation=sgn,FACT1=1Portfolio EDEND: 2014-06-26", year = "2014", doi = "10.1109/ICASSP.2014.6854723", language = "English", isbn = "978-1-4799-2892-7", series = "IEEE International Conference on Acoustics, Speech and Signal Processing", publisher = "IEEE", pages = "5839--5843", booktitle = "2014 IEEE International Conference on Acoustics, Speech and Signal processing (ICASSP), May 4-9 2014, Florence, Italy", }
@inproceedings{6b0e797b0a1b4664807e07239230bf63, title = "Opportunities and Challenges of Mobile Applications as {"}Tickets-to-Talk{"}: A Scenario-Based User Study", abstract = "This paper presents a scenario-based user study of mobile application concepts that would encourage interaction between people within close proximity. The scenarios demonstrate three themes of digital tickets-to-talk: informing who and what are around, augmenting self-expression, and online interaction encouraging physical interaction. Our interview study explored the opportunities and challenges of such applications in developing into further face-to-face interactions between strangers. Tickets that are related to activities that convey a solid intention that would lead to practical collaboration, such as playing sports or studying together, have the best potential to advance to meaningful face-to-face interaction. Augmenting selfexpression and online interaction encouraging physical interaction were found to have potential to create curiosity but seen less credible by our 42 interview participants to motivate face-to-face interaction between strangers. We conclude by discussing the potential of each theme of ticket-to-talk based on our findings as well as related literature.", keywords = "Awareness system, Co-located interaction, Faceto-face interaction, Mobile technology, Scenarios, Storyboards, User experience, User study", author = "Pradthana Jarusriboonchai and Thomas Olsson and Jarno Ojala and Kaisa V{\"a}{\"a}n{\"a}nen-Vainio-Mattila", note = "Contribution: organisation=tie,FACT1=1Portfolio EDEND: 2014-12-31Publisher name: ACM", year = "2014", doi = "10.1145/2677972.2677993", language = "English", isbn = "978-1-4503-3304-7", series = "International conference on mobile and ubiquitous multimedia", publisher = "ACM", pages = "89--97", booktitle = "Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia, MUM2014, November 25-28, 2014, Melbourne, Australia", }
@inproceedings{52d5ab5593fb4afaa64f746971d53a5a, title = "Optimal neighborhood preserving visualization by Maximum satisfiability", abstract = "We present a novel approach to low-dimensional neighbor embedding for visualization, based on formulating an information retrieval based neighborhood preservation cost function as Maximum satisfiability on a discretized output display. The method has a rigorous interpretation as optimal visualization based on the cost function. Unlike previous lowdimensional neighbor embedding methods, our formulation is guaranteed to yield globally optimal visualizations, and does so reasonably fast. Unlike previous manifold learning methods yielding global optima of their cost functions, our cost function and method are designed for low-dimensional visualization where evaluation and minimization of visualization errors are crucial. Our method performs well in experiments, yielding clean embeddings of datasets where a stateof-the-art comparison method yields poor arrangements. In a real-world case study for semi-supervised WLAN signal mapping in buildings we outperform state-of-the-art methods.", author = "Kerstin Bunte and Matti J{\"a}rvisalo and Jeremias Berg and Petri Myllym{\"a}ki and Jaakko Peltonen and Samuel Kaski", year = "2014", language = "English", volume = "3", pages = "1694--1700", booktitle = "Proceedings of the National Conference on Artificial Intelligence", publisher = "AI Access Foundation", address = "United States", }
@inproceedings{08b211a1a5384328912cac22ba7164c8, title = "Optimization equivalence of divergences improves neighbor embedding", abstract = "Visualization methods that arrange data objects in 2D or 3D layouts have followed two main schools, methods oriented for graph layout and methods oriented for vectorial embedding. We show the two previously separate approaches are tied by an optimization equivalence, making it possible to relate methods from the two approaches and to build new methods that take the best of both worlds. In detail, we prove a theorem of optimization equivalences between β- And γ-, as well as α- And R{\'e}nyi-divergences through a connection scalar. Through the equivalences we represent several nonlinear dimensionality reduction and graph drawing methods in a generalized stochastic neighbor embedding setting, where information divergences are minimized between similarities in input and output spaces, and the optimal connection scalar provides a natural choice for the tradeoff between attractive and repulsive forces. We give two ex-amples of developing new visualization methods through the equivalences: 1) We develop weighted symmetric stochastic neighbor embedding (ws-SNE) from Elastic Embedding and analyze its benefits, good performance for both vectorial and network data; in experiments ws-SNE has good performance across data sets of different types, whereas comparison methods fail for some of the data sets; 2) we develop a γ- divergence version of a Poly Log layout method; the new method is scale invariant in the output space and makes it possible to efficiently use large-scale smoothed neighborhoods.", author = "Zhirong Yang and Jaakko Peltonen and Samuel Kaski", year = "2014", language = "English", volume = "2", pages = "1808--1839", booktitle = "31st International Conference on Machine Learning, ICML 2014", publisher = "International Machine Learning Society (IMLS)", }
@inproceedings{92c56389b61746be8a29a31ba838843f, title = "Software architectures for implementing achievement badges - Practical experiences", abstract = "There are multiple commercial and non-commercial products available to integrate gamification aspects to existing services. Some of these are platform dependent whilst others are more general purpose. Commercial systems come with some problems - for example, lack of control and privacy issues. To avoid these problems, we created two iterations of badge systems and tested both of them on large courses (ca. 300 students each). In this paper, we present these systems and evaluate their merits and flaws. Based on our experiences, we present design principles on how to implement badge systems to existing online learning environments.", keywords = "Achievement badges, Automated assessment, Gamification, System design", author = "Lassi Haaranen and Lasse Hakulinen and Petri Ihantola and Ari Korhonen", year = "2014", doi = "10.1109/LaTiCE.2014.16", language = "English", isbn = "9781479935918", pages = "41--46", booktitle = "Proceedings - 2014 International Conference on Teaching and Learning in Computing and Engineering, LATICE 2014", publisher = "IEEE COMPUTER SOCIETY PRESS", }
@article{a7db612e60374fa7bcaf8ff58209d9f6, title = "Special Issue on Embedded Computer Systems: Architectures, Modeling and Simulation", author = "John McAllister and David Guevorkian and Hartwig Jeschke and Mihai Sima", year = "2014", doi = "10.1007/s10766-014-0321-x", language = "English", volume = "43", journal = "International Journal of Parallel Programming", issn = "0885-7458", publisher = "Springer Verlag", number = "1", }
@inproceedings{416ca9c764144bfa8f6b307d9a432622, title = "The usability of text entry systems now and in the future", abstract = "Text entry is an active and growing research domain. Our SIG serves three purposes. First, to strengthen the text entry community by bringing text entry researchers working in the human-computer interaction, natural language processing and augmentative and alternative communication communities together in one room. Second, to promote CHI as a natural and compelling focal point for all kinds of text entry research. Third, to follow-up on and broaden the discussions that emerged from two previous text entry workshops held at CHI [3, 4] by engaging in dialog to identify obstacles for success and formalizing procedures for measuring progress in the field of text entry.", keywords = "Accessibility, Augmentative and alternative communication, Internationalization, Text entry", author = "James Clawson and Poika Isokoski and Stephen Brewster and Antti Oulasvirta and Mark Dunlop and Keith Vertanen and Kristensson, {Per Ola} and Annalu Waller", year = "2014", doi = "10.1145/2559206.2559217", language = "English", isbn = "9781450324748", pages = "1139--1142", booktitle = "CHI EA 2014: One of a ChiNd - Extended Abstracts, 32nd Annual ACM Conference on Human Factors in Computing Systems", publisher = "Association for Computing Machinery", }
@article{a62e128528a34d3899aef790ec8c81bd, title = "Automated design of networks of transport-triggered architecture processors using dynamic dataflow programs", abstract = "Modern embedded systems show a clear trend towards the use of Multiprocessor System-on-Chip (MPSoC) architectures in order to handle the performance and power consumption constraints. However, the design and validation of dedicated MPSoCs is an extremely hard and expensive task due to their complexity. Thus, the development of automated design processes is of highest importance to satisfy the time-to-market pressure of embedded systems. This paper proposes an automated co-design flow based on the high-level language-based approach of the Reconfigurable Video Coding framework. The designer provides the application description in the RVC-CAL dataflow language, after which the presented co-design flow automatically generates a network of heterogeneous processors that can be synthesized on FPGA chips. The synthesized processors are Very Long Instruction Word-style processors. Such a methodology permits the rapid design of a many-core signal processing system which can take advantage of all levels of parallelism. The toolchain functionality has been demonstrated by synthesizing an MPEG-4 Simple Profile video decoder to two different FPGA boards. The decoder is realized into 18 processors that decode QCIF resolution video at 45 frames per second on a 50 MHz FPGA clock frequency. The results show that the given application can take advantage of every level of parallelism.", keywords = "Co-design, Dataflow programming, Multi-Processor System-on-Chip (MPSoC), Reconfigurable Video Coding (RVC), Transport-Trigger Architecture (TTA)", author = "Herv{\'e} Yviquel and Jani Boutellier and Micka{\"e}l Raulet and Emmanuel Casseau", year = "2013", month = "11", doi = "10.1016/j.image.2013.08.013", language = "English", volume = "28", pages = "1295--1302", journal = "Signal Processing: Image Communication", issn = "0923-5965", publisher = "Elsevier", number = "10", }
@inproceedings{8ee963f9a6c1491699a55fd5a4d419d8, title = "Configurable, resource-optimized FFT architecture for OFDM communication", abstract = "In this paper, we present a designer-configurable, resource efficient FPGA architecture for OFDM system implementation. Our design achieves a significant improvement in resource efficiency for a given data rate. This efficiency improvement is achieved through careful analysis of how FFT computation is performed within the context of OFDM systems, and streamlining memory management and control logic based on this analysis. In particular, our OFDM-targeted FFT design eliminates redundant buffer memory, and simplifies control logic to save FPGA resources. We have synthesized and tested our design using the Xilinx ISE 13.4 synthesis tool, and compared the results with the Xilinx FFT v7.1, which is a widely used commercial FPGA IP core. We have demonstrated that our design provides at least 8.8{\%} enhancement in terms of resource efficiency compared to Xilinx FFT v7.1 when it is embedded within the same OFDM configuration.", keywords = "FFT, FPGA, OFDM, Resource", author = "Inkeun Cho and Shen, {Chung Ching} and Yahia Tachwali and Hsu, {Chia Jui} and Bhattacharyya, {Shuvra S.}", year = "2013", month = "10", day = "18", doi = "10.1109/ICASSP.2013.6638156", language = "English", isbn = "9781479903566", pages = "2746--2750", booktitle = "2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings", }
@inproceedings{1a56b2b72cd1416da9646578d61e2a7b, title = "Programmable lowpower implementation of the HEVC Adaptive Loop Filter", abstract = "The Adaptive Loop Filter (ALF) is a subjective and objective image quality improving filter in the High Efficiency Video Coding standard (HEVC). The ALF has shown to be computationally complex and its complexity has been reduced during the HEVC development process. In the HEVC TestModel HM-7.0 ALF is a 9×7 cross + 3×3 square shaped filter. This paper presents a programmable application specific instruction processor for the ALF. The proposed processor processes 1920×1080p luminance frames at 30 frames per second, when operated at a clock frequency of 311MHz. Low power consumption and a low gate count make the proposed processor suitable for embedded devices. The processor program code is written in pure C-language, which allows versatile use of the circuit and updates to the filter functionality without modifying the processor design. To the authors' best knowledge this is the first programmable solution for ALF on embedded devices.", keywords = "Adaptive filters, Coprocessors, Video signal processing", author = "Ilkka Hautala and Jani Boutellier and Jari Hannuksela", year = "2013", month = "10", day = "18", doi = "10.1109/ICASSP.2013.6638139", language = "English", isbn = "9781479903566", pages = "2664--2668", booktitle = "2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings", }
@article{2ee38f025a0044b59eaefba7e465732c, title = "An evaluation of the virtual curvature with the StickGrip haptic device: A case study", abstract = "Dynamic simulation of distance to the physical surface could promote the development of new inexpensive tools for blind and visually impaired users. The StickGrip is a haptic device comprised of the Wacom pen input device added with a motorized penholder. The goal of the research presented in this paper was to assess the accuracy and usefulness of the new pen-based interaction technique when the position and displacement of the penholder in relation to the pen tip provided haptic feedback to the user about the distance to the physical or virtual surface of interaction. The aim was to examine how accurately people are able (1) to align the randomly deformed virtual surfaces to the flat surface and (2) to adjust the number of surface samples having a randomly assigned curvature to the template having the given curvature and kept fixed. These questions were approached by measuring both the values of the adjusted parameters and the parameters of the human performance, such as a ratio between inspection time and control time spent by the participants to complete the matching task with the use of the StickGrip device. The test of the pen-based interaction technique was conducted in the absence of visual feedback when the subject could rely on the proprioception and kinesthetic sense. The results are expected to be useful for alternative visualization and interaction with complex topographic and mathematical surfaces, artwork, and modeling.", keywords = "Curved surface, Kinesthetic feedback, Pen-based interaction, StickGrip haptic device", author = "Evreinova, {Tatiana V.} and Grigori Evreinov and Roope Raisamo", year = "2013", month = "6", doi = "10.1007/s10209-012-0273-0", language = "English", volume = "12", pages = "161--173", journal = "Universal Access in the Information Society", issn = "1615-5289", publisher = "Springer Verlag", number = "2", }
@article{486280cd46114f118be1d176698fddd9, title = "Multi-view action recognition based on action volumes, fuzzy distances and cluster discriminant analysis", abstract = "In this paper, we present a view-independent action recognition method exploiting a low computational-cost volumetric action representation. Binary images depicting the human body during action execution are accumulated in order to produce the so-called action volumes. A novel time-invariant action representation is obtained by exploiting the circular shift invariance property of the magnitudes of the Discrete Fourier Transform coefficients. The similarity of an action volume with representative action volumes is exploited in order to map it to a lower-dimensional feature space that preserves the action class properties. Discriminant learning is, subsequently, employed for further dimensionality reduction and action class discrimination. By using such an action representation, the proposed approach performs fast action recognition. By combining action recognition results coming from different view angles, high recognition rates are obtained. The proposed method is extended to interaction recognition, i.e., to human action recognition involving two persons. The proposed approach is evaluated on a publicly available action recognition database using experimental settings simulating situations that may appear in real-life applications, as well as on a new nutrition support action recognition database.", keywords = "Action recognition, Action volumes, Cluster discriminant analysis, Fuzzy vector quantization", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2013", month = "6", doi = "10.1016/j.sigpro.2012.08.015", language = "English", volume = "93", pages = "1445--1457", journal = "Signal Processing", issn = "0165-1684", publisher = "Elsevier", number = "6", }
@article{450dea34c5fd48e9a43d5fa97dea6749, title = "Indirect measurement of the vascular endothelial glycocalyx layer thickness in human submucosal capillaries with a plug-in for ImageJ", abstract = "Background: The thickness of vascular endothelial glycocalyx layer can be measured indirectly during a spontaneous leukocyte passage from oral submucosal capillaries in humans. The subsequent differences in red blood cell (RBC) column widths, before a spontaneous white blood cell passage (pre-WBC) and after a spontaneous WBC passage (post-WBC) can be used in off-line analysis to measure glycocalyx thickness: [pre-WBC width - post-WBC width]/2. We created and validated a semi-automatic plug-in for ImageJ to measure the endothelial glycocalyx layer thickness. Methods: Video clips presenting human sublingual microvasculature were created with a side-stream dark field imaging device. Spontaneous leukocyte passages in capillaries were analyzed from video clips with ImageJ. The capillary glycocalyx layer thickness was measured by the indirect approach with two manual and two semi-automatic methods. Results: There were no statistically significant differences between glycocalyx layer thicknesses measured with different methods, even though small inter-method differences in RBC column thicknesses could be detected. Inter-rater differences were systematically smaller with both semi-automatic methods. Intra-rater coefficient of variation [CV] (95{\%} CI) was largest when measurements were made completely manually [9.2{\%} (8.4-10.0)], but improved significantly with automatic image enhancement prior to manual measurement [7.2{\%} (6.4-8.0)]. CV could be improved further when using semi-automatic analysis with an in-frame median filter radius of 1 pixel [5.8{\%} (5.0-6.6)], or a median filter radius of 2 pixels [4.3{\%} (3.5-5.1)]. Conclusions: Semi-automatic analysis of glycocalyx decreased the intra-rater CV and the inter-rater differences compared to the manual method. On average, each of the four methods yielded equal results for the glycocalyx thickness. Being the only feasible bed side method in most clinical scenarios, indirect measurement of glycocalyx thickness with orthogonal polarization spectral imaging or side-stream dark field imaging device and our plug-in can advance the study of glycocalyx layer pathology in man.", keywords = "Endothelial surface layer, Glycocalyx, Imagej, Open source, Side-stream dark field", author = "Sasu Liuhanen and Marko Sallisalmi and Ville Pettil{\"a} and Niku Oksala and Jyrki Tenhunen", year = "2013", month = "4", doi = "10.1016/j.cmpb.2012.10.019", language = "English", volume = "110", pages = "38--47", journal = "Computer Methods and Programs in Biomedicine", issn = "0169-2607", publisher = "Elsevier", number = "1", }
@article{d74fc62af24741febc166dc22021d050, title = "High-performance and low-energy buffer mapping method for multiprocessor DSP systems", abstract = "When implementing digital signal processing (DSP) applications onto multiprocessor systems, one significant problem in the viewpoints of performance is the memory wall. In this paper, to help alleviate the memory wall problem, we propose a novel, high-performance buffer mapping policy for SDF-represented DSP applications on bus-based multiprocessor systems that support the shared-memory programming model. The proposed policy exploits the bank concurrency of the DRAM main memory system according to the analysis of hierarchical parallelism. Energy consumption is also a critical parameter, especially in battery-based embedded computing systems. In this paper, we apply a synchronization back-off scheme on the top of the proposed high-performance buffer mapping policy to reduce energy consumption. The energy saving is attained by minimizing the number of non-essential synchronization transactions. We measure throughput and energy consumption on both synthetic and real benchmarks. The simulation results show that the proposed buffer mapping policy is very useful in terms of performance, especially in memory-intensive applications where the total execution time of computational tasks is relatively small compared to that of memory operations. In addition, the proposed synchronization back-off scheme provides a reduction in the number of synchronization transactions without degrading performance, which results in system energy saving.", keywords = "Bank concurrency, DRAM main memory systems, Multiprocessor DSP systems, SDF", author = "Dongwon Lee and Marilyn Wolf and Bhattacharyya, {Shuvra S.}", year = "2013", month = "3", doi = "10.1145/2442116.2442132", language = "English", volume = "12", journal = "ACM Transactions on Embedded Computing Systems", issn = "1539-9087", publisher = "Association for Computing Machinery", number = "3", }
@inproceedings{db28fa6c7443415a8c1dece28d41e5d1, title = "'Aie-studio' - A pragmatist aesthetic approach for procedural sound design", abstract = "This paper introduces the AIE-Studio (Audio Interfaces for Exploration), a modular dataflow patching library implemented with Pure Data. The AIE-Studio introduces new tools for procedural sound design through generative sonic and musical structures. Particular focus is on aesthetic experience. The designed modules allow versatile dataflow mapping through matrix routing system while also enabling the sound designer to influence generative processes of music creation. In particular, The AIE-Studio was used to create generative sonic and musical material in an embodied game-like application. In this paper we present key questions driving the research, theoretical background, research approach and the main development activities .", keywords = "Aesthetic experience, Artistic interfaces, Generative strategies, Procedural audio, Procedural sound design, Pure data, Sonic interaction design", author = "Matti Luhtala and Markku Turunen and Jaakko Hakulinen and Tuuli Keskinen", year = "2013", doi = "10.1145/2544114.2544124", language = "English", isbn = "9781450326599", booktitle = "Proceedings of the 8th Audio Mostly: A Conference on Interaction with Sound, AM 2013 - In Cooperation with ACM SIGCHI", publisher = "Association for Computing Machinery", }
@inproceedings{e8a55691995e4f67b949d3d911e2aa71, title = "A lightweight many-to-many authentication protocol for near field communications", abstract = "In this paper the lightweight many-to-many authentication protocol, that uses Near Field Communications as a carrier technology is proposed. The solution works without any user interaction and can be applied for almost any data storage device: NFC or RFID tag, USB-flash drive, etc. The major novelty of the system is real-time encryption key generation algorithm. This approach doesn't require any computation power on the tag, trusted third parties or secure link between tag and information system. So far, the mentioned features transforms to significant advantages of the proposed solution, while compared to existing analogues: OAuth, Opacity and LMAP. At the same time, the integrity of key sequences is not guarantied, that brings motivation for future research in the field.", author = "Vitaly Petrov and Maria Komar and Yevgeni Koucheryavy", year = "2013", doi = "10.1109/ICNP.2013.6733633", language = "English", isbn = "9781479912704", booktitle = "Proceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013", publisher = "IEEE COMPUTER SOCIETY PRESS", }
@inproceedings{b03cbc743e79498981f45ff8a6f4e124, title = "A movable immaterial volumetric display", abstract = "We have created a movable, limitedly volumetric {"}immaterial{"} display. Our prototype is the first mobile, hand-held fogscreen. It can show e.g., slices of volumetric objects when swept across mid-air. It is based on the patented FogScreen [Fogio 2013] technology. The previous FogScreen installations have been fixed set-ups, where the screen device and a projector are typically rigged up, leaving space for the viewers to walk through the mid-air display. Also mid-air virtual reality and mid-air user interfaces have been implemented [DiVerdi et al. 2006, Rakkolainen et al. 2009]. 2013 Copyright held by the Owner/Author.", author = "Ismo Rakkolainen and Antti Sand", year = "2013", doi = "10.1145/2542302.2542305", language = "English", isbn = "9781450326346", booktitle = "SIGGRAPH Asia 2013 Posters, SA 2013", }
@inproceedings{24a156cb62a34dfea53593865c0ef739, title = "Checking visual data flow programs with finite process models", abstract = "A visual data flow language (VDFL) allows graphical presentation of a computer program in the form of a directed graph, where data tokens travel through the arcs of the graph, and the vertices present e.g. the input token streams, calculations, comparisons, and conditionals. Amongst their benefits, VDFLs allow parallel computing and they are presumed to improve the quality of programming due to their intuitive readability. Thus, they are also suitable for computing education. However, the token-based computational model allowing parallel processing may make the programs more complicated than what they look. We propose a method for checking properties of VDFL programs using finite state processes (FSPs) using a commonly available labelled transition system analyser (LTSA) tool. The method can also be used to study different VDFL programming constructs for development or re-design of VDFLs. For our method, we have implemented a compiler that compiles a textual representation of a VDFL into FSPs.", author = "Jyrki Nummenmaa and Maija Marttila-Kontio and Timo Nummenmaa", year = "2013", language = "English", pages = "245--258", booktitle = "13th Symposium on Programming Languages and Software Tools, SPLST 2013 - Proceedings", publisher = "University of Szeged", address = "Hungary", }
@article{eecbed802c40453ca6a247049905f48e, title = "Dynamic action recognition based on dynemes and Extreme Learning Machine", abstract = "In this paper, we propose a novel method that performs dynamic action classification by exploiting the effectiveness of the Extreme Learning Machine (ELM) algorithm for single hidden layer feedforward neural networks training. It involves data grouping and ELM based data projection in multiple levels. Given a test action instance, a neural network is trained by using labeled action instances forming the groups that reside to the test sample's neighborhood. The action instances involved in this procedure are, subsequently, mapped to a new feature space, determined by the trained network outputs. This procedure is performed multiple times, which are determined by the test action instance at hand, until only a single class is retained. Experimental results denote the effectiveness of the dynamic classification approach, compared to the static one, as well as the effectiveness of the ELM in the proposed dynamic classification setting.", keywords = "Activity recognition, Dynamic classification, Extreme Learning Machine, Fuzzy vector quantization", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2013", doi = "10.1016/j.patrec.2012.10.019", language = "English", volume = "34", pages = "1890--1898", journal = "Pattern Recognition Letters", issn = "0167-8655", publisher = "Elsevier", number = "15", }
@inproceedings{b997a114b9a147e98d29138383111cb6, title = "Front-camera video recordings as emotion responses to mobile photos shared within close-knit groups", abstract = "People use social-photography services to tell stories about themselves and to solicit responses from viewers. State-of-the-art services concentrate on textual comments, {"}Like{"} buttons, or similar means for viewers to give explicit feedback, but they overlook other, non-textual means. This paper investigates how emotion responses-as video clips captured by the front camera of a cell phone and used as tags for the individual photo viewed-can enhance photo-sharing experiences for close-knit groups. Our exploration was carried out with a mobile social-photography service called Social Camera. Four user groups (N=19) used the application for two to four weeks. The study's results support the value of using front-camera video recordings to glean emotion response. It supports lightweight phatic social interactions not possible with comments and {"}Like{"} buttons. Most users kept sharing emotion responses throughout the study. They typically shared the responses right after they saw a just-taken photo received from a remote partner. They used the responses to share their current contexts with others just as much as to convey nuanced feelings about a photo. We discuss the implications for future design and research.", keywords = "Close-knit group, Co-presence, Emotion response, Feedback, Mobile, Social camera, Social photography", author = "Yanqing Cui and Jari Kangas and Jukka Holm and Guido Grassel", year = "2013", doi = "10.1145/2470654.2466125", language = "English", isbn = "9781450318990", pages = "981--990", booktitle = "CHI 2013: Changing Perspectives, Conference Proceedings - The 31st Annual CHI Conference on Human Factors in Computing Systems", }
@inproceedings{d66ff6fac289436d88575e31f6827553, title = "Gestures and widgets: Performance in text editing on multi-touch capable mobile devices", abstract = "We describe the design and evaluation of a gestural text editing technique for touchscreen devices. The gestures are drawn on top of the soft keyboard and interpreted as commands for moving the caret, performing selections, and controlling the clipboard. Our implementation is an Android service that can be used in any text editing task on Android-based devices. We conducted an experiment to compare the gestural editing technique against the widget-based technique available on a smartphone (Samsung Galaxy II with Android 2.3.5). The results show a performance benefit of 13-24{\%} for the gestural technique depending on the font size. Subjective feedback from the participants was also positive. Because the two editing techniques use different input areas, they can coexist on a device. This means that the gestural editing can be added on any soft keyboard without interfering with user experience for those users that choose not to use it.", keywords = "Android, Caret movement, Clipboard, Gestures, Text editing", author = "Vittorio Fuccella and Poika Isokoski and Beno{\^i}t Martin", year = "2013", doi = "10.1145/2470654.2481385", language = "English", isbn = "9781450318990", pages = "2785--2794", booktitle = "CHI 2013: Changing Perspectives, Conference Proceedings - The 31st Annual CHI Conference on Human Factors in Computing Systems", }
@article{f38d84f31ca74e6b83946e4fe36d543f, title = "Guest editorial", author = "Peeter Ellervee and Jari Nurmi", year = "2013", doi = "10.1016/j.micpro.2013.05.002", language = "English", volume = "37", pages = "430--431", journal = "Microprocessors and Microsystems", issn = "0141-9331", publisher = "Elsevier", number = "4-5", }
@inproceedings{146125d3747344b4a8d2050708146a6d, title = "How to study programming on mobile touch devices - Interactive Python code exercises", abstract = "Scaffolded learning tasks where programs are constructed from predefined code fragments by dragging and dropping them (i.e. Parsons problems) are well suited to mobile touch devices, but quite limited in their applicability. They do not adequately cater for different approaches to constructing a program. After studying solutions to automatically assessed programming exercises, we found out that many different solutions are composed of a relatively small set of mutually similar code lines. Thus, they can be constructed by using the drag-and-drop approach if only it was possible to edit some small parts of the predefined fragments. Based on this, we have designed and implemented a new exercise type for mobile devices that builds on Parsons problems and falls somewhere between their strict scaffolding and full-blown coding exercises. In these exercises, we can gradually fade the scaffolding and allow programs to be constructed more freely so as not to restrict thinking and limit creativity too much while still making sure we are able to deploy them to small-screen mobile devices. In addition to the new concept and the related implementation, we discuss other possibilities of how programming could be practiced on mobile devices.", keywords = "learning, mLearning, mobile learning, mobile touch devices, parsons problem, parsons puzzle, programming, Python, teaching", author = "Petri Ihantola and Juha Helminen and Ville Karavirta", year = "2013", doi = "10.1145/2526968.2526974", language = "English", isbn = "9781450324823", pages = "51--58", booktitle = "Proceedings - 13th Koli Calling International Conference on Computing Education Research, Koli Calling 2013", }
@article{32b998f6c7224b08b8afc4fe267d08b7, title = "Information retrieval perspective to meta-visualization", abstract = "In visual data exploration with scatter plots, no single plot is sufficient to analyze complicated high-dimensional data sets. Given numerous visualizations created with different features or methods, meta-visualization is needed to analyze the visualizations together. We solve how to arrange numerous visualizations onto a meta-visualization display, so that their similarities and differences can be analyzed. We introduce a machine learning approach to optimize the meta-visualization, based on an information retrieval perspective: Two visualizations are similar if the analyst would retrieve similar neighborhoods between data samples from either visualization. Based on the approach, we introduce a nonlinear embedding method for meta-visualization: it optimizes locations of visualizations on a display, so that visualizations giving similar information about data are close to each other.", keywords = "Meta-visualization, Neighbor embedding, Nonlinear dimensionality reduction", author = "Jaakko Peltonen and Ziyuan Lin", year = "2013", language = "English", volume = "29", pages = "165--180", journal = "Journal of Machine Learning Research", issn = "1532-4435", publisher = "Journal of Machine Learning Research", }
@inproceedings{f4d8d0371f624d3798cef331bcc22afd, title = "Long-term tracking through failure cases", abstract = "Long term tracking of an object, given only a single instance in an initial frame, remains an open problem. We propose a visual tracking algorithm, robust to many of the difficulties which often occur in real-world scenes. Correspondences of edge-based features are used, to overcome the reliance on the texture of the tracked object and improve invariance to lighting. Furthermore we address long-term stability, enabling the tracker to recover from drift and to provide redetection following object disappearance or occlusion. The two-module principle is similar to the successful state-of-the-art long-term TLD tracker, however our approach extends to cases of low-textured objects. Besides reporting our results on the VOT Challenge dataset, we perform two additional experiments. Firstly, results on short-term sequences show the performance of tracking challenging objects which represent failure cases for competing state-of-the-art approaches. Secondly, long sequences are tracked, including one of almost 30000 frames which to our knowledge is the longest tracking sequence reported to date. This tests the re-detection and drift resistance properties of the tracker. All the results are comparable to the state-of-the-art on sequences with textured objects and superior on non-textured objects. The new annotated sequences are made publicly available.", keywords = "Computer vision, Edge, Line correspondence, Long-term tracking, Low texture, Visual tracking", author = "Karel Lebeda and Simon Hadfield and Jiri Matas and Richard Bowden", year = "2013", doi = "10.1109/ICCVW.2013.26", language = "English", isbn = "9781479930227", pages = "153--160", booktitle = "Proceedings - 2013 IEEE International Conference on Computer Vision Workshops, ICCVW 2013", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@inproceedings{bf09e6bc98f34b2a851ef63021110454, title = "Mixed reality with multimodal head-mounted pico projector", abstract = "Many kinds of displays can be used for augmented reality (AR). Multimodal head-mounted pico projector is a concept, which is little explored for AR. It opens new possibilities for wearable dis-plays. In this paper we present our proof-of-concept prototype of a multimodal head-mounted pico projector. Our main contributions are the display concept and some usage examples for it.", keywords = "Augmented reality, Mixed reality, Multimodality, Pico projector, Wearable displays", author = "Antti Sand and Ismo Rakkolainen", year = "2013", doi = "10.1145/2466816.2466831", language = "English", isbn = "9781450318754", booktitle = "Proceedings of the Virtual Reality International Conference on Laval Virtual, VRIC 2013", }
@article{89a14a8efbff44b2b524ab55acb7c260, title = "On the optimal class representation in linear discriminant analysis", abstract = "Linear discriminant analysis (LDA) is a widely used technique for supervised feature extraction and dimensionality reduction. LDA determines an optimal discriminant space for linear data projection based on certain assumptions, e.g., on using normal distributions for each class and employing class representation by the mean class vectors. However, there might be other vectors that can represent each class, to increase class discrimination. In this brief, we propose an optimization scheme aiming at the optimal class representation, in terms of Fisher ratio maximization, for LDA-based data projection. Compared with the standard LDA approach, the proposed optimization scheme increases class discrimination in the reduced dimensionality space and achieves higher classification rates in publicly available data sets.", keywords = "Class representation, data projection, linear discriminant analysis (LDA), subspace learning", author = "Alexandros Iosifidis and Anastasios Tefas and Ioannis Pitas", year = "2013", doi = "10.1109/TNNLS.2013.2258937", language = "English", volume = "24", pages = "1491--1497", journal = "IEEE Transactions on Neural Networks and Learning Systems", issn = "2162-237X", publisher = "IEEE Computational Intelligence Society", number = "9", }
@inproceedings{55f7dbf336f74153bdffed012e660617, title = "Power harvesting from microwave oven electromagnetic leakage", abstract = "In this paper, we considered the possibility of using electricity harvested from the microwave field leaked from commercial microwave ovens. Our experimental results showed that the leakage received by a dipole antenna was about 0 dBm (1 mW) at a point 5 cm in front of the door. A rectenna consisting of a dipole antenna and charge pump can convert the leaked microwave energy into a DC current. When a microwave oven is operated for 2 min, 9.98 mJ of energy was harvested. We demonstrated that this energy is sufficient for powering a digital cooking timer to count down for 3 min and beep for 2.5 s. The operation of other kitchen devices was also demonstrated.", keywords = "Energy harvesting, Microwave oven, Wireless sensing", author = "Yoshihiro Kawahara and Xiaoying Bian and Ryo Shigeta and Rushi Vyas and Tentzeris, {Manos M.} and Tohru Asami", year = "2013", doi = "10.1145/2493432.2493500", language = "English", isbn = "9781450317702", pages = "373--381", booktitle = "UbiComp 2013 - Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing", }
@inproceedings{40745dc9976f423eb4d589a283e65db1, title = "Reading on-screen text with gaze-based auto-scrolling", abstract = "Visual information on eye movements can be used to facilitate scrolling while one is reading on-screen text. We carried out an experiment to find preferred reading regions on the screen and implemented an automatic scrolling technique based on the preferred regions of each individual reader. We then examined whether manual and automatic scrolling have an effect on reading behaviour on the basis of eye movement metrics, such as fixation duration and fixation count. We also studied how different font sizes affect the eye movement metrics. Results of analysis of data collected from 24 participants indicated no significant difference between manual and automatic scrolling in reading behaviour. Preferred reading regions on the screen varied among the participants. Most of them preferred relatively short regions. A significant effect of font size on fixation count was found. Subjective opinions indicated that participants found automatic scrolling convenient to use.", keywords = "automatic scrolling, eye movements, fixation count, fixation duration, manual scrolling, reading, reading region", author = "Selina Sharmin and Oleg Špakov and R{\"a}ih{\"a}, {Kari Jouko}", year = "2013", doi = "10.1145/2509315.2509319", language = "English", isbn = "9781450321105", pages = "24--31", booktitle = "Proceedings of the 2013 Conference on Eye Tracking South Africa, ETSA 2013", }
@inproceedings{6a0e8007ec52426895ae190b95a6867a, title = "Recording and analyzing in-browser programming sessions", abstract = "In this paper, we report on the analysis of a novel type of automatically recorded detailed programming session data collected on a university-level web programming course. We present a method and an implementation of collecting rich data on how students learning to program edit and execute code and explore its use in examining learners' behavior. The data collection instrument is an in-browser Python programming environment that integrates an editor, an execution environment, and an interactive Python console and is used to deliver programming assignments with automatic feedback. Most importantly, the environment records learners' interaction within it. We have implemented tools for viewing these traces and demonstrate their potential in learning about the programming processes of learners and of benefiting computing education research and the teaching of programming.", keywords = "computer science education, computing education research, programming assignment, programming session, Python, web based programming environment", author = "Juha Helminen and Petri Ihantola and Ville Karavirta", year = "2013", doi = "10.1145/2526968.2526970", language = "English", isbn = "9781450324823", pages = "13--22", booktitle = "Proceedings - 13th Koli Calling International Conference on Computing Education Research, Koli Calling 2013", }
@inproceedings{12ca46af3255470a87f6ca7978d79ea7, title = "SiMPE: 8th workshop on speech and sound in mobile and pervasive environments", abstract = "The SiMPE workshop series started in 2006 with the goal of enabling speech processing on mobile and embedded devices. The SiMPE 2012 workshop extended the notion of audio to non-speech {"}Sounds{"} and thus the expansion became {"}Speech and Sound{"}. SiMPE 2010 and 2011 brought together researchers from the speech and the HCI communities. Speech User interaction in cars was a focus area in 2009. Multimodality got more attention in SiMPE 2008. In SiMPE 2007, the focus was on developing regions. With SiMPE 2013, the 8th in the series, we continue to explore the area of speech along with sound. Akin to language processing and text-to-speech synthesis in the voice-driven interaction loop, sensors can track continuous human activities such as singing, walking, or shaking the mobile phone, and non-speech audio can facilitate continuous interaction. The technologies underlying speech processing and sound processing are quite different and these communities have been working mostly independent of each other. And yet, for multimodal interactions on the mobile, it is perhaps natural to ask whether and how speech and sound can be mixed and used more effectively and naturally.", keywords = "mobile computing, sonic interaction, sound, sound and music computing, speech processing", author = "Nanavati, {Amit A.} and Nitendra Rajput and Saurabh Srivastava and Cumhur Erkut and Antti Jylh{\"a} and Rudnicky, {Alexander I.} and Stefania Serafin and Markku Turunen", year = "2013", doi = "10.1145/2493190.2499471", language = "English", isbn = "9781450322737", pages = "626--629", booktitle = "MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services", }
@inproceedings{dab96b60549144e290a3d6fadb7a0dce, title = "The visual object tracking VOT2013 challenge results", abstract = "Visual tracking has attracted a significant attention in the last few decades. The recent surge in the number of publications on tracking-related problems have made it almost impossible to follow the developments in the field. One of the reasons is that there is a lack of commonly accepted annotated data-sets and standardized evaluation protocols that would allow objective comparison of different tracking methods. To address this issue, the Visual Object Tracking (VOT) workshop was organized in conjunction with ICCV2013. Researchers from academia as well as industry were invited to participate in the first VOT2013 challenge which aimed at single-object visual trackers that do not apply pre-learned models of object appearance (model-free). Presented here is the VOT2013 benchmark dataset for evaluation of single-object visual trackers as well as the results obtained by the trackers competing in the challenge. In contrast to related attempts in tracker benchmarking, the dataset is labeled per-frame by visual attributes that indicate occlusion, illumination change, motion change, size change and camera motion, offering a more systematic comparison of the trackers. Furthermore, we have designed an automated system for performing and evaluating the experiments. We present the evaluation protocol of the VOT2013 challenge and the results of a comparison of 27 trackers on the benchmark dataset. The dataset, the evaluation tools and the tracker rankings are publicly available from the challenge website (http://votchallenge. net).", keywords = "Visual object tracking challenge, VOT2013", author = "Matej Kristan and Roman Pflugfelder and Aleš Leonardis and Jiri Matas and Fatih Porikli and Luka Čehovin and Georg Nebehay and Gustavo Fernandez and Tom{\'a}š Voj{\'i}ř and Adam Gatt and Ahmad Khajenezhad and Ahmed Salahledin and Ali Soltani-Farani and Ali Zarezade and Alfredo Petrosino and Anthony Milton and Behzad Bozorgtabar and Bo Li and Chan, {Chee Seng} and Cherkeng Heng and Dale Ward and David Kearney and Dorothy Monekosso and Karaimer, {Hakki Can} and Rabiee, {Hamid R.} and Jianke Zhu and Jin Gao and Jingjing Xiao and Junge Zhang and Junliang Xing and Kaiqi Huang and Karel Lebeda and Lijun Cao and Maresca, {Mario Edoardo} and Lim, {Mei Kuan} and Mohamed ELHelw and Michael Felsberg and Paolo Remagnino and Richard Bowden and Roland Goecke and Rustam Stolkin and Lim, {Samantha Yue Ying} and Sara Maher and Sebastien Poullot and Sebastien Wong and Shin'Ichi Satoh and Weihua Chen and Weiming Hu and Xiaoqin Zhang and Yang Li and Zhiheng Niu", year = "2013", doi = "10.1109/ICCVW.2013.20", language = "English", isbn = "9781479930227", pages = "98--111", booktitle = "Proceedings - 2013 IEEE International Conference on Computer Vision Workshops, ICCVW 2013", publisher = "Institute of Electrical and Electronics Engineers Inc.", address = "United States", }
@article{d7d43f2fbbad4307a8ede41d6c6449aa, title = "Touch gestures in communicating emotional intention via vibrotactile stimulation", abstract = "Remote communication between people typically relies on audio and vision although current mobile devices are increasingly based on detecting different touch gestures such as swiping. These gestures could be adapted to interpersonal communication by using tactile technology capable of producing touch stimulation to a user's hand. It has been suggested that such mediated social touch would allow for new forms of emotional communication. The aim was to study whether vibrotactile stimulation that imitates human touch can convey intended emotions from one person to another. For this purpose, devices were used that converted touch gestures of squeeze and finger touch to vibrotactile stimulation. When one user squeezed his device or touched it with finger(s), another user felt corresponding vibrotactile stimulation on her device via four vibrating actuators. In an experiment, participant dyads comprising a sender and receiver were to communicate variations in the affective dimensions of valence and arousal using the devices. The sender's task was to create stimulation that would convey unpleasant, pleasant, relaxed, or aroused emotional intention to the receiver. Both the sender and receiver rated the stimulation using scales for valence and arousal so that the match between sender's intended emotions and receiver's interpretations could be measured. The results showed that squeeze was better at communicating unpleasant and aroused emotional intention, while finger touch was better at communicating pleasant and relaxed emotional intention. The results can be used in developing technology that enables people to communicate via touch by choosing touch gesture that matches the desired emotion.", keywords = "Affective interaction, Emotions, Haptics, Mediated social touch, Mobile devices, Tactile communication", author = "Jussi Rantala and Katri Salminen and Roope Raisamo and Veikko Surakka", year = "2013", doi = "10.1016/j.ijhcs.2013.02.004", language = "English", volume = "71", pages = "679--690", journal = "International Journal of Human-Computer Studies", issn = "1071-5819", publisher = "Elsevier", number = "6", }
@article{77c4f0aeae084dca9aa1202c5bb5ed39, title = "Elastic image registration for guiding focal laser ablation of prostate cancer: Preliminary results", abstract = "Purpose: To guide ultrasound-driven prostate photodynamic therapy using information from MRI-based treatment planning. Methods: Robust points matching (RPM) and thin plate splines (TPS) are used to solve correspondences and to map optimally positioned landmarks from MR images to transrectal ultrasound (TRUS) images. The algorithm uses a reduced number of anatomical markers that are initialized on the images. Results: Both phantom and patient data were used to evaluate precision and robustness of the method. Mean registration error (±standard deviation) was of 2.18. ±. 0.25. mm and 1.55. ±. 0.31. mm for patient prostate and urethra, respectively. Repeated tests with different markers initialization conditions showed that the quality of registration was neither influenced by the number of markers nor to the human observer. Conclusion: This method allows for satisfyingly accurate and robust non rigid registration of MRI and TRUS and provides practitioners with substantial help in mapping treatment planning from pre-operative MRI to interventional TRUS.", keywords = "Image-guided interventions, Magnetic resonance imaging, Non rigid registration, PDT, Prostate cancer, Transrectal ultrasound imaging", author = "Nasr Makni and Philippe Puech and Pierre Colin and Abdelrahmene Azzouzi and Serge Mordon and Nacim Betrouni", year = "2012", month = "10", doi = "10.1016/j.cmpb.2012.04.001", language = "English", volume = "108", pages = "213--223", journal = "Computer Methods and Programs in Biomedicine", issn = "0169-2607", publisher = "Elsevier", number = "1", }
@article{1729741fc37e43af97193e7c015f5693, title = "Focused multi-task learning in a Gaussian process framework", abstract = "Multi-task learning, learning of a set of tasks together, can improve performance in the individual learning tasks. Gaussian process models have been applied to learning a set of tasks on different data sets, by constructing joint priors for functions underlying the tasks. In these previous Gaussian process models, the setting has been symmetric in the sense that all the tasks have been assumed to be equally important, whereas in settings such as transfer learning the goal is asymmetric, to enhance performance in a target task given the other tasks. We propose a focused Gaussian process model which introduces an {"}explaining away{"} model for each of the additional tasks to model their non-related variation, in order to focus the transfer to the task-of-interest. This focusing helps reduce the key problem of negative transfer, which may cause performance to even decrease if the tasks are not related closely enough. In experiments, our model improves performance compared to single-task learning, symmetric multi-task learning using hierarchical Dirichlet processes, transfer learning based on predictive structure learning, and symmetric multi-task learning with Gaussian processes.", keywords = "Gaussian processes, Multi-task learning, Negative transfer, Transfer learning", author = "Gayle Leen and Jaakko Peltonen and Samuel Kaski", year = "2012", month = "10", doi = "10.1007/s10994-012-5302-y", language = "English", volume = "89", pages = "157--182", journal = "Machine Learning", issn = "0885-6125", publisher = "Springer Verlag", number = "1-2", }
@article{65a9273d9f6242e4be86af2c6ac446db, title = "SymbolChat: A flexible picture-based communication platform for users with intellectual disabilities", abstract = "Persons with intellectual disabilities benefit from participating in the modern information society, especially the World Wide Web, social media and Internet-mediated communication services. Although several computer-based prototypes and commercial systems have been introduced for accessible in-person communication, currently few applications and services exist to support synchronous remote communication for this user group. We introduce SymbolChat, a software platform that supports the creation of multimodal communication applications utilizing picture-based instant messaging. End users and their support personnel can customize the input and output features of the application based on their individual needs and abilities. The interaction is based on touchscreen input and speech output using speech synthesis technology. The SymbolChat platform was developed together with the prospective end users and practitioners in the field of special needs care. We evaluated the prototype application in a field study with nine users with varying degrees of intellectual and other disabilities. The results clearly indicate that the participants were able to express themselves in spontaneous communication using a large-scale picture-based vocabulary (around 2000 symbols) even without prior training in the use of symbols. This finding was supported in the constructive feedback gathered from professionals working in the area. We also successfully applied methodology from other settings, such as child-computer interaction to evaluate interaction in this challenging context. Overall, the results show that social inclusion for people with intellectual disabilities can be improved with customizable communication tools. The implemented communication platform forms a solid basis for further improvements and new communication services. In addition, we found that users with motor impairments would greatly benefit from alternative input and output methods for symbol browsing and selection.", keywords = "Augmentative and alternative communication, Instant messaging, Picture-based communication, User-centered design", author = "Tuuli Keskinen and Tomi Heimonen and Markku Turunen and Rajaniemi, {Juha Pekka} and Sami Kauppinen", year = "2012", month = "9", doi = "10.1016/j.intcom.2012.06.003", language = "English", volume = "24", pages = "374--386", journal = "Interacting with Computers", issn = "0953-5438", publisher = "Oxford University Press", number = "5", }
@article{3e934c522902439d99e99dcabd492dda, title = "Barriers to task-based information access in molecular medicine", abstract = "We analyze barriers to task-based information access in molecular medicine, focusing on research tasks, which provide task performance sessions of varying complexity. Molecular medicine is a relevant domain because it offers thousands of digital resources as the information environment. Data were collected through shadowing of real work tasks. Thirty work task sessions were analyzed and barriers in these identified. The barriers were classified by their character (conceptual, syntactic, and technological) and by their context of appearance (work task, system integration, or system). Also, work task sessions were grouped into three complexity classes and the frequency of barriers of varying types across task complexity levels were analyzed. Our findings indicate that although most of the barriers are on system level, there is a quantum of barriers in integration and work task contexts. These barriers might be overcome through attention to the integrated use of multiple systems at least for the most frequent uses. This can be done by means of standardization and harmonization of the data and by taking the requirements of the work tasks into account in system design and development, because information access is seldom an end itself, but rather serves to reach the goals of work tasks.", author = "Sanna Kumpulainen and Kalervo J{\"a}rvelin", year = "2012", month = "1", doi = "10.1002/asi.21672", language = "English", volume = "63", pages = "86--97", journal = "JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY", issn = "2330-1635", publisher = "John Wiley and Sons Ltd", number = "1", }
@inproceedings{f5a522ba4ca54e4bafadb311c56840eb, title = "2nd international workshop on pervasive eye tracking and mobile eye-based interaction (PETMEI 2012): Proposal for a workshop (mini-track) at UbiComp 2012", author = "Andreas Bulling and Geert Br{\^o}ne and Shiwei Cheng and P{\"a}ivi Majaranta", year = "2012", language = "English", isbn = "9781450312240", pages = "673--676", booktitle = "UbiComp'12 - Proceedings of the 2012 ACM Conference on Ubiquitous Computing", }
@inproceedings{3c3f7c7d33ce48fda1d9f99d93f8fbe7, title = "An empirical investigation of perceived reliability of open source Java programs", abstract = "Background: Open Source Software (OSS) is used by a continuously growing number of people, both end-users and developers. The quality of OSS is thus an issue of increasing interest. Specifically, OSS stakeholders need to trust OSS with respect to a number of qualities. Objective: This paper focuses on the level of trust that OSS stakeholders have in OSS reliability, one of the most important software qualities. The goal of the work reported here is to investigate to what extent the perception of reliability by users depends on objectively measurable characteristics of software. Method: We collected subjective user evaluations of the reliability of 22 Java OSS products, and then we measured their code characteristics that are generally believed to affect the quality of software. Finally, we carried out a correlational study to predict the perceived level of reliability of OSS based on the measured characteristics of the software code. Result: We obtained a set of statistically significant quantitative models, collectively called MOSST\REL, which account for the dependence of the perceived reliability of OSS on objectively observable qualities of Java code. Conclusions: The models we obtained can be used by: 1) endusers and developers that would like to reuse existing OSS products and components, to evaluate the perceived level of reliability of these OSS products that can be expected based on the characteristics of code; 2) the developers of OSS products, who can set code quality targets based on the level of perceived reliability they want to achieve.", keywords = "object-oriented measures, open source software, reliability model", author = "Luigi Lavazza and Sandro Morasca and Davide Taibi and Davide Tosi", year = "2012", doi = "10.1145/2245276.2231951", language = "English", isbn = "9781450308571", pages = "1109--1114", booktitle = "27th Annual ACM Symposium on Applied Computing, SAC 2012", }
@inproceedings{5e743543806c4d15a0c8b03d989aa1a5, title = "An exploratory study of eye typing fundamentals: Dwell time, text entry rate, errors, and workload", abstract = "Although eye typing (typing on an on-screen keyboard via one's eyes as they are tracked by an eye tracker) has been studied for more than three decades now, we still know relatively little about it from the users' point of view. Standard metrics such as words per minute and keystrokes per character yield information only about the effectiveness of the technology and the interaction techniques developed for eye typing. We conducted an extensive study with almost five hours of eye typing per participant and report on extended qualitative and quantitative analysis of the relationship of dwell time, text entry rate, errors made, and workload experienced by the participants. The analysis method is comprehensive and stresses the need to consider different metrics in unison. The results highlight the importance of catering for individual differences and lead to suggestions for improvements in the interface.", keywords = "Adjustable dwell time, Error analysis, Extended study, Eye tracking, Eye typing, Workload", author = "R{\"a}ih{\"a}, {Kari Jouko} and Saila Ovaska", year = "2012", doi = "10.1145/2207676.2208711", language = "English", isbn = "9781450310154", pages = "3001--3010", booktitle = "Conference Proceedings - The 30th ACM Conference on Human Factors in Computing Systems, CHI 2012", }
@inproceedings{e1de04c6ad3642d6a17ef0e2611c54f2, title = "Briefing news reporting with mobile assignments - Perceptions, needs and challenges", abstract = "Mobile handheld devices are an increasing part of everyday fieldwork of news professionals. Mobile assignments delivered to mobile journalists' smartphones are one potential future development step. We present findings on using mobile assignments from two exploratory user studies in which smartphones were used as news reporting tools. Mobile assignments were perceived as handy for fast reporting situations and simple stories but challenging in case of more complex tasks. Structured information content of assignments, process phase based information and supporting situation and activity awareness would support the work of both editorial staff and mobile journalists. The locationing of reporters for sending location-based assignments was found acceptable for coordinating the work although some privacy concerns were expressed. The findings provide new information on using mobile assignments in work where carrying out tasks involves creativity and the tasks may be complex, not strictly limited or they may not have clear completion criteria. {\circledC} 2012 ACM.", keywords = "assignment, crowdsourcing, journalist, location, mobile, news, privacy., professional, smartphone, task, work", author = "Heli V{\"a}{\"a}t{\"a}j{\"a} and Paul Egglestone", note = "ei ut-numeroa 21.9.2013Contribution: organisation=ohj,FACT1=1Publisher name: ACM", year = "2012", doi = "10.1145/2145204.2145280", language = "English", isbn = "9781450310864", series = "ACM Conference on Computer Supported Cooperative Work", publisher = "ACM", pages = "485--494", booktitle = "Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work CSCW'12 Seattle, WA, USA, February 11-15, 2012", }
@inproceedings{099ba72932124a2d98d9da29c61f0267, title = "Comparison of video-based pointing and selection techniques for hands-free text entry", abstract = "Video-based human-computer interaction has received increasing interest over the years. However, earlier research has been mainly focusing on technical characteristics of different methods rather than on user performance and experiences in using computer vision technology. This study aims to investigate performance characteristics of novice users and their subjective experiences in typing text with several video-based pointing and selection techniques. In Experiment 1, eye tracking and head tracking were applied for the task of pointing at the keys of a virtual keyboard. The results showed that gaze pointing was significantly faster but also more erroneous technique as compared with head pointing. Self-reported subjective ratings revealed that it was generally better, faster, more pleasant and efficient to type using gaze pointing than head pointing. In Experiment 2, mouth open and brows up facial gestures were utilized for confirming the selection of a given character. The results showed that text entry speed was approximately the same for both selection techniques, while mouth interaction caused significantly fewer errors than brow interaction. Subjective ratings did not reveal any significant differences between the techniques. Possibilities for design improvements are discussed.", keywords = "computer vision, eye tracking, face detection, text entry, video-based interaction, virtual keyboard, visual gesture", author = "Yulia Gizatdinova and Oleg Špakov and Veikko Surakka", year = "2012", doi = "10.1145/2254556.2254582", language = "English", isbn = "9781450312875", pages = "132--139", booktitle = "Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2012", }
@inproceedings{9982e895e3c04fab872e637f9aadeb29, title = "Continuous Edgewrite: Dictionary-based disambiguation instead of explicit segmentation by the user", abstract = "Edgewrite is a text entry method where the user follows the edges of a physical guiding rectangle to enter corner sequences that are interpreted as characters. The original Edgewrite character set resembles the Latin alphabet and includes explicit character segmentation by lifting the stylus (or centering the joystick, etc). We present a variant of Edgewrite that we call the continuous Edgewrite. It relies on a dictionary instead of user's character segmentation to disambiguate words. New users can use the continuous Edgewrite with the help of an interactive visualization of possible continuations while writing. In a 6-session user study we measured initial text transcription performance (increased from 1 to 5.4 wpm) and the ratio of observed explicit segmentations to optimal continuous writing (decreased from 2.5 to 1.5). These results show that it is possible to learn to use the continuous writing mode, but also that the learning takes some time.", keywords = "continuous writing, dictionary, disambiguation, EdgeWrite, segmentation, text entry", author = "Beno{\^i}t Martin and Poika Isokoski and Gregory Karmann and Thomas Rollinger", year = "2012", doi = "10.1145/2254556.2254625", language = "English", isbn = "9781450312875", pages = "357--364", booktitle = "Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2012", }
@inproceedings{ac8aefd78e6a4ecfa83d199a50569e4b, title = "Designing and evaluating text entry methods", abstract = "Our workshop has three primary goals. The first goal is community building: we want to get text entry researchers that are active in different communities into one place. Our second goal is to promote CHI as a natural and compelling focal point for all kinds of text entry research. The third goal is to discuss some difficult issues that are hard or near impossible to handle within the traditional format of research papers.", keywords = "accessibility, augmentative and alternative communication, internationalization, text entry", author = "Kristensson, {Per Ola} and James Clawson and Mark Dunlop and Poika Isokoski and Brian Roark and Keith Vertanen and Annalu Waller and Jacob Wobbrock", year = "2012", doi = "10.1145/2212776.2212711", language = "English", isbn = "9781450310161", pages = "2747--2750", booktitle = "Extended Abstracts - The 30th ACM Conference on Human Factors in Computing Systems, CHI 2012", }
@inproceedings{97a4639800da43d69b3bf79520e974e5, title = "Enhanced gaze interaction using simple head gestures", abstract = "We propose a combination of gaze pointing and head gestures for enhanced hands-free interaction. Instead of the traditional dwell-time selection method, we experimented with five simple head gestures: nodding, turning left/right, and tilting left/right. The gestures were detected from the eye-tracking data by a range-based algorithm, which was found accurate enough in recognizing nodding and leftdirected gestures. The gaze estimation accuracy did not noticeably suffer from the quick head motions. Participants pointed to nodding as the best gesture for occasional selections tasks and rated the other gestures as promising methods for navigation (turning) and functional mode switching (tilting). In general, dwell time works well for repeated tasks such as eye typing. However, considering multimodal games or transient interactions in pervasive and mobile environments, we believe a combination of gaze and head interaction could potentially provide a natural and more accurate interaction method.", keywords = "Dwell time, Eye tracking, Head gestures, Selection", author = "Oleg Špakov and P{\"a}ivi Majaranta", year = "2012", language = "English", isbn = "9781450312240", pages = "705--710", booktitle = "UbiComp'12 - Proceedings of the 2012 ACM Conference on Ubiquitous Computing", }
@inproceedings{c15ff6e9bdb646ae9de40a3b3c65b7b8, title = "FS-PGBR: A scalable and delay sensitive cloud routing protocol", abstract = "This paper proposes an improved version of a .fully tributed routing protocol, that is applicable for cloud computing infrastructure. Simulation results showstheprotocol is ideal for discovering cloud services ... a scalable manner with minimum latency.", keywords = "Cloud computing infrastructure, Scalable route discovery", author = "Julien Mineraud and William Donnelly and Sasitharan Balasubramaniam and Jussi Kangasharju", year = "2012", doi = "10.1145/2377677.2377741", language = "English", isbn = "9781450314190", volume = "42", pages = "301--302", booktitle = "Proceedings of the ACM SIGCOMM 2012 and Best Papers of the Co-located Workshops", edition = "4", }
@inproceedings{7ab4796fe2ad4df2a3dc01e8043d270e, title = "Inkjet-printed monopole antennas for enhanced-range WBAN and wearable biomonitoring application", abstract = "In this paper, a monopole antenna backed by an inkjet-printed electromagnetic band gap ground (EBG) plane on paper substrate is proposed for wearable applications with drastically enhanced communication range. This novel design approach for WBAN and wearable biomonitoring applications alleviates the on-body antenna's performance degradation, which may cause a significant degradation of the wireless system's performance as well. The communication range improvement compared to conventional antenna is demonstrated by using a benchmarking commercial wireless temperature sensor module. In addition, the advantages and the integrability of the proposed wearable antenna topology into mobile wireless on-body health care systems is discussed in detail.", keywords = "electromagnetic band gap (ebg) structure, inkjet printing, personal area networks (pans), system level antenna integration, wearable antenna, wireless body area networks (wbans)", author = "Sangkil Kim and Yoshihiro Kawahara and Tentzeris, {Manos M.}", year = "2012", doi = "10.1145/2248341.2248355", language = "English", isbn = "9781450312929", pages = "33--38", booktitle = "MobileHealth'12 - Proceedings of the 2nd ACM International Workshop on Pervasive Wireless Healthcare", }
@article{863339aeeded48ffa21e92a2f9673c3b, title = "Novel approaches to crawling important pages early", abstract = "Web crawlers are essential to many Web applications, such as Web search engines, Web archives, and Web directories, which maintain Web pages in their local repositories. In this paper, we study the problem of crawl scheduling that biases crawl ordering toward important pages. We propose a set of crawling algorithms for effective and efficient crawl ordering by prioritizing important pages with the well-known PageRank as the importance metric. In order to score URLs, the proposed algorithms utilize various features, including partial link structure, inter-host links, page titles, and topic relevance. We conduct a large-scale experiment using publicly available data sets to examine the effect of each feature on crawl ordering and evaluate the performance of many algorithms. The experimental results verify the efficacy of our schemes. In particular, compared with the representative RankMass crawler, the FPR-title-host algorithm reduces computational overhead by a factor as great as three in running time while improving effectiveness by 5{\%} in cumulative PageRank.", keywords = "Crawl ordering, Fractional PageRank, PageRank, Web crawler", author = "Alam, {Md Hijbul} and Ha, {Jong Woo} and Lee, {Sang Keun}", year = "2012", doi = "10.1007/s10115-012-0535-4", language = "English", volume = "33", pages = "707--734", journal = "Knowledge and Information Systems", issn = "0219-1377", publisher = "Springer Verlag", number = "3", }
@article{559d313df369438f8217229dcc64fcee, title = "On the definition of dynamic software measures", abstract = "The quantification of several software attributes (e.g., size, complexity, cohesion, coupling) is usually carried out in a static fashion, and several hundreds of measures have been defined to this end. However, static measurement may only be an approximation for the measurement of these attributes during software use. The paper proposes a theoretical framework based on Axiomatic Approaches for the definition of sensible dynamic software measures that can dynamically capture these attributes. Dynamic measures based on this framework are defined for dynamically quantifying size and coupling. In this paper, we also compare dynamic measures of size and coupling against well-known static measures by correlating them with fault-pronenesses of four case studies.", keywords = "Code coverage, Dynamic coupling, Dynamic measures, Dynamic size", author = "Luigi Lavazza and Sandro Morasca and Davide Taibi and Davide Tosi", year = "2012", doi = "10.1145/2372251.2372259", language = "English", pages = "39--48", journal = "International Symposium on Empirical Software Engineering and Measurement", issn = "1949-3770", }
@inproceedings{96e806734fa6452ca79bd707c8581bf4, title = "Parameterized scheduling for signal processing systems using topological patterns", abstract = "In recent work, a graphical modeling construct called {"}topological patterns{"} has been shown to enable concise representation and direct analysis of repetitive dataflow graph sub-structures in the context of design methods and tools for digital signal processing systems [1]. In this paper, we present a formal design method for specifying topological patterns and deriving parameterized schedules from such patterns based on a novel schedule model called the scalable schedule tree. The approach represents an important class of parameterized schedule structures in a form that is intuitive for representation and efficient for code generation. We demonstrate our methods for topological pattern representation, scalable schedule tree derivation, and associated dataflow graph code generation using a case study for image processing.", keywords = "image registration, scheduling, software tools", author = "Shenpei Wu and Shen, {Chung Ching} and Nimish Sane and Kelly Davis and Bhattacharyya, {Shuvra S.}", year = "2012", doi = "10.1109/ICASSP.2012.6288190", language = "English", isbn = "9781467300469", pages = "1561--1564", booktitle = "2012 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2012 - Proceedings", }
@inproceedings{78e3f55acbd7449993abfdcedda87426, title = "Power allocation in multi-node cooperative network in Rician fading channels", abstract = "Cooperative communications have been recommended to exploit the inherent spatial diversity gains in multiuser wireless systems without the need of multiple transceivers at each node. This is achieved when wireless nodes help to each other to send multiple independent transmission paths to the destination. The advantage of cooperation can be exploited significantly by allocating the power of the system optimally. Thus, in this paper we first derive the approximate symbol error rate (SER) for multi-node cooperative networks employing decode-and-forward (DF) protocol with a maximum ratio combining (MRC) at the receiving terminals in Racian fading channels. Using the approximated SER expression, optimal power allocation (OPA) scheme under different line-of-sight (LOS) scenarios is investigated. Numerical and simulation results are presented to illustrate the performance improvement due to OPA of the cooperative networks.", keywords = "Cooperative, decode-and-forward, multi-node, optimal power allocation, Rician fading, SER analysis", author = "Fikadu, {Mulugeta K.} and Mohammed Elmusrati and Reino Virrankoski", year = "2012", doi = "10.1109/WiMOB.2012.6379119", language = "English", isbn = "9781467314305", pages = "496--501", booktitle = "2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob 2012", }
@inproceedings{e403b0d1680c43e390a86c3a0f1bd758, title = "SenSprout: Inkjet-printed soil moisture and leaf wetness sensor", abstract = "In this paper we show a low cost and environmentally friendly fabrication for an agricultural sensing application. An antenna, a soil moisture sensor, and a leaf wetness sensor are inkjet-printed on paper substrate. A microprocessor attached to the paper substrate is capable of detecting the capacitance change on the surface of the sensor, and report the data over the wireless communication interface. This sensing system is useful to optimize irrigation systems.", keywords = "Energy harvesting, Inkjet-printing", author = "Yoshihiro Kawahara and Hoseon Lee and Tentzeris, {Manos M.}", year = "2012", language = "English", isbn = "9781450312240", pages = "545", booktitle = "UbiComp'12 - Proceedings of the 2012 ACM Conference on Ubiquitous Computing", }
@inproceedings{491790734a244cd9a981cd8681971327, title = "SiMPE: 7th Workshop on speech and sound in mobile and pervasive environments", abstract = "The SiMPE workshop series started in 2006 [2] with the goal of enabling speech processing on mobile and embedded devices to meet the challenges of pervasive environments (such as noise) and leveraging the context they offer (such as location). SiMPE 2010 and 2011 brought together researchers from the speech and the HCI communities. Multimodality got more attention in SiMPE 2008 than it had received in the previous years. In SiMPE 2007, the focus was on developing regions. Speech User interaction in cars was a focus area in 2009. With SiMPE 2012, the 7th in the series, we hope to explore the area of speech along with sound. When using the mobile in an eyes-free manner, it is natural and convenient to hear about notifications and events. The arrival of an SMS has used a very simple sound based notification for a long time now. The technologies underlying speech processing and sound processing are quite different and these communities have been working mostly independent of each other. And yet, for multimodal interactions on the mobile, it is perhaps natural to ask whether and how speech and sound can be mixed and used more effectively and naturally.", keywords = "Audio interaction, Mobile computing, Pervasive computing, Sound, Speech processing", author = "Nanavati, {Amit Anil} and Nitendra Rajput and Rudnicky, {Alexandar I.} and Markku Turunen and Thomas Sandholm and Cosmin Munteanu and Gerald Penn", year = "2012", doi = "10.1145/2371664.2371727", language = "English", isbn = "9781450311052", pages = "251--253", booktitle = "MobileHCI'12 - Companion Proceedings of the 14th International Conference on Human Computer Interaction with Mobile Devices and Services", }
@inproceedings{3232dee8887a4ea48338179e3ad7ef17, title = "Systematic integration of flowgraph- and module-level parallelism in implementation of DSP applications on multiprocessor systems-on-chip", abstract = "Increasing use of multiprocessor system-on-chip (MPSoC) technology is an important trend in the design and implementation of signal processing systems. However, the design of efficient DSP software for MPSoC platforms involves complex inter-related steps, including data decomposition, memory management, and inter-task and inter-thread synchronization. These design steps are challenging, especially under strict constraints on performance and power consumption, and tight time to market pressures. To facilitate these steps, we have developed a new dataflow based design flow within the targeted dataflow interchange format (TDIF) design tool. Our new MPSoC-oriented design flow, called TDIF-PPG, is geared towards analysis and mapping of embedded DSP applications on MPSoCs. An important feature of TDIF-PPG is its capability to integrate graph level parallelism for DSP system flowgraphs and actor level parallelism for DSP functional modules into the application mapping processing. Here, graph level parallelism is exposed by the dataflow graph application representation in TDIF, and actor level parallelism is modeled by a novel model for multiprocessor dataflow graph implementation that we call the parallel processing group (PPG) model. We demonstrate our approach through actor and subsystem design for software defined radio.", author = "Zheng Zhou and Shen, {Chung Ching} and William Plishker and Wu, {Hsiang Huang} and Bhattacharyya, {Shuvra S.}", year = "2012", doi = "10.1109/ICoSP.2012.6491686", language = "English", isbn = "9781467321945", volume = "1", pages = "402--408", booktitle = "ICSP 2012 - 2012 11th International Conference on Signal Processing, Proceedings", }
@article{f4ccedb81aae4f868b52bb7c5d8ec27d, title = "Managing concern knowledge in software systems", abstract = "Knowledge representation, acquisition, and sharing in software development projects is challenging due to the involvement of different kinds of stakeholders and large heterogeneous repositories of artifacts. In this paper, we argue that the concept of a concern can be used to facilitate the management of knowledge concerning the various system artifacts. Concerns represent pieces of knowledge pertaining to various viewpoints and interests of the stakeholders. In order to represent concerns, we propose the use of a non-intrusive role-based mechanism called a fragment. Using this mechanism, tacit knowledge can be made explicit by mapping stakeholders interests to artifact repositories, concern-based queries can be addressed to the repositories, and concerns can be combined to produce new knowledge. A concern-based prototype tool environment for knowledge management has been built and used for evaluating the approach in the context of industrial case studies.", keywords = "Knowledge management, Separation of concerns, Software development tools, Software repositories", author = "Imed Hammouda and Kai Koskimies and Tommi Mikkonen", year = "2011", month = "11", doi = "10.1142/S0218194011005566", language = "English", volume = "21", pages = "957--987", journal = "INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING", issn = "0218-1940", publisher = "World Scientific Publishing", number = "7", }
@article{b9fc74184ecb473abb61ef44c18c8463, title = "Interaction strategies for an affective conversational agent", abstract = "The development of embodied conversational agents (ECA) as companions brings several challenges for both affective and conversational dialogue. These include challenges in generating appropriate affective responses, selecting the overall shape of the dialogue, providing prompt system response times, and handling interruptions. We present an implementation of such a companion showing the development of individual modules that attempt to address these challenges. Further, to resolve resulting conflicts, we present encompassing interaction strategies that attempt to balance the competing requirements along with dialogues from our working prototype to illustrate these interaction strategies in operation. Finally, we provide the results of an evaluation of the companion using an evaluation methodology created for conversational dialogue and including analysis using appropriateness annotation.", author = "Cameron Smith and Nigel Crook and Simon Dobnik and Daniel Charlton and Johan Boye and Stephen Pulman and {Santos de la Camara}, Raul and Markku Turunen and David Benyon and Jay Bradley and Bj{\"o}rn Gamb{\"a}ck and Preben Hansen and Oli Mival and Nick Webb and Marc Cavazza", year = "2011", month = "10", doi = "10.1162/PRES_a_00063", language = "English", volume = "20", pages = "395--411", journal = "Presence: Teleoperators and Virtual Environments", issn = "1054-7460", publisher = "Massachusetts Institute of Technology Press", number = "5", }
@article{1f2c773422914c328ad29bd69705421f, title = "A survey on open source software trustworthiness", abstract = "Trustworthiness is a crucial characteristic when it comes to evaluating any product, even more so for open source software, which is now becoming widely used. The authors conducted a survey to identify the reasons and motivations that lead software companies to adopt or reject open source software; they then ranked, according to importance, the specific trust factors used when selecting an open source software component or product. The motivations and importance ranking of factors might be useful for both developers of open source software (to make their products and components more useful for other stakeholders) and to future prospective open source software users.", keywords = "external software qualities, internal software qualities, open source software, pragmatic software engineering, trustworthiness", author = "{Del Bianco}, Vieri and Luigi Lavazza and Sandro Morasca and Davide Taibi", year = "2011", month = "9", doi = "10.1109/MS.2011.93", language = "English", volume = "28", pages = "67--75", journal = "IEEE Software", issn = "0740-7459", publisher = "Institute of Electrical and Electronics Engineers", number = "5", }
@article{6d6d96aeeebc464f8fdd6134b96626c6, title = "Guidelines for improving the testing process of open source software", abstract = "Open Source Software (OSS) products do not usually follow traditional software engineering development paradigms. Specifically, testing activities in OSS development may be quite different from those carried out in Closed Source Software (CSS) development. As testing and verification require a good deal of resources in OSS, it is necessary to have ways to assess and improve OSS testing processes. This paper provides a set of testing guidelines and issues that OSS developers can use to decide which testing techniques make most sense for their OSS products. This paper 1) provides a checklist that helps OSS developers identify the most useful testing techniques according to the main characteristics of their products, and 2) outlines a proposal for a method that helps assess the maturity of OSS testing processes. The method is a proposal of a Maturity Model for testing processes (called OSS-TMM). To show its usefulness, the authors apply the method to seven real-life projects. Specifically, the authors apply the method to BusyBox, Apache Httpd, and Eclipse Test & Performance Tools Platform to show how the checklist supports and guides the testing process of these OSS products.", keywords = "Open Source Software (OSS) Quality, Survey, Testing Process, Testing Quality Assessment, Trustworthiness", author = "Sandro Morasca and Davide Taibi and Davide Tosi", year = "2011", month = "4", doi = "10.4018/jossp.2011040101", language = "English", volume = "3", pages = "1--22", journal = "International Journal of Open Source Software and Processes", issn = "1942-3926", publisher = "IGI Global", number = "2", }
@article{aa66325192db4e69b0c1425fc9f7bf4e, title = "Multimodal and mobile conversational Health and Fitness Companions", abstract = "Multimodal conversational spoken dialogues using physical and virtual agents provide a potential interface to motivate and support users in the domain of health and fitness. This paper describes how such multimodal conversational Companions can be implemented to support their owners in various pervasive and mobile settings. We present concrete system architectures, virtual, physical and mobile multimodal interfaces, and interaction management techniques for such Companions. In particular how knowledge representation and separation of low-level interaction modelling from high-level reasoning at the domain level makes it possible to implement distributed, but still coherent, interaction with Companions. The distribution is enabled by using a dialogue plan to communicate information from domain level planner to dialogue management and from there to a separate mobile interface. The model enables each part of the system to handle the same information from its own perspective without containing overlapping logic, and makes it possible to separate task-specific and conversational dialogue management from each other. In addition to technical descriptions, results from the first evaluations of the Companions interfaces are presented.", keywords = "Cognitive modelling, Companions, Conversational spoken dialogue systems, Dialogue management, Embodied conversational agents, Mobile interfaces", author = "Markku Turunen and Jaakko Hakulinen and Olov St{\aa}hl and Bj{\"o}rn Gamb{\"a}ck and Preben Hansen and {Rodr{\'i}guez Gancedo}, {Mari C.} and {De La C{\'a}mara}, {Ra{\'u}l Santos} and Cameron Smith and Daniel Charlton and Marc Cavazza", year = "2011", month = "4", doi = "10.1016/j.csl.2010.04.004", language = "English", volume = "25", pages = "192--209", journal = "Computer Speech and Language", issn = "0885-2308", publisher = "Elsevier", number = "2", }
@article{a8fbd31c155d4fd5b62bd81854c1411a, title = "Some background on dialogue management and conversational speech for dialogue systems", abstract = "Several dialogue management (DM) architectures and conversational speech for dialogue systems are presented. Basic types of DM systems include dialogue grammars and frames, plan-based and collaborative systems, and conversational games theory. DM architectures include SmartKom, Trindi, WITAS, CONVERSE, COMIC, agent-based dialogue management, and DM and automatic speech recognition (ASR) language modeling. All data collection tasks should be tailored for the conversational scenario under consideration as each scenario can present different properties. It is shown in the multimodal dialogue system that turn taking can usually be achieved by a fusion of gesture, gaze, and intonation. Intonation within the speech signal informs the dialogue manager when new information is introduced into the current conversation. By placing established emotion detection methods within the recursive nature of conversation we can consider discourse as the exploitation of the shared set of interaction affordances.", keywords = "Dialogue architectures, Dialogue management, Dialogue systems, Emotion detection, Human-computer interaction", author = "Yorick Wilks and Roberta Catizone and Simon Worgan and Markku Turunen", year = "2011", month = "4", doi = "10.1016/j.csl.2010.03.001", language = "English", volume = "25", pages = "128--139", journal = "Computer Speech and Language", issn = "0885-2308", publisher = "Elsevier", number = "2", }
@inproceedings{2323bc62e9154e6f984b1d2f4a9b21ac, title = "A model-based schedule representation for heterogeneous mapping of dataflow graphs", abstract = "Dataflow-based application specifications are widely used in model-based design methodologies for signal processing systems. In this paper, we develop a new model called the dataflow schedule graph (DSG) for representing a broad class of dataflow graph schedules. The DSG provides a graphical representation of schedules based on dataflow semantics. In conventional approaches, applications are represented using dataflow graphs, whereas schedules for the graphs are represented using specialized notations, such as various kinds of sequences or looping constructs. In contrast, the DSG approach employs dataflow graphs for representing both application models and schedules that are derived from them. Our DSG approach provides a precise, formal framework for unambiguously representing, analyzing, manipulating, and interchanging schedules. We develop detailed formulations of the DSG representation, and present examples and experimental results that demonstrate the utility of DSGs in the context of heterogeneous signal processing system design.", keywords = "Dataflow graphs, Heterogeneous computing, Models of computation, Scheduling", author = "Wu, {Hsiang Huang} and Shen, {Chung Ching} and Nimish Sane and William Plishker and Bhattacharyya, {Shuvra S.}", year = "2011", doi = "10.1109/IPDPS.2011.128", language = "English", isbn = "9780769543857", pages = "70--81", booktitle = "2011 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum, IPDPSW 2011", }
@inproceedings{d49e6d19a58f4177b9c4661e7cd5e625, title = "Bit-sliced binary normal basis multiplication", abstract = "The performance of many cryptographic primitives is reliant on efficient algorithms and implementation techniques for arithmetic in binary fields. While dedicated hardware support for said arithmetic is an emerging trend, the study of software-only implementation techniques remains important for legacy or non-equipped processors. One such technique is that of software-based bit-slicing. In the context of binary fields, this is an interesting option since there is extensive previous work on bit-oriented designs for arithmetic in hardware, such designs are intuitively well suited to bit-slicing in software. In this paper we harness previous work, using it to investigate bit-sliced, software-only implementation arithmetic for binary fields, over a range of practical field sizes and using a normal basis representation. We apply our results to demonstrate significant performance improvements for a stream cipher, and over the frequently employed Ning-Yin approach to normal basis implementation in software.", keywords = "Algorithm design, analysis, Computations in finite fields, Computer arithmetic, Data encryption", author = "Billy Brumley and Dan Page", year = "2011", doi = "10.1109/ARITH.2011.36", language = "English", isbn = "9780769543185", pages = "205--212", booktitle = "Proceedings - 20th IEEE Symposium on Computer Arithmetic, ARITH-20", }
@inproceedings{97ebf7be3d3e4f80a5c1f768de5dda7b, title = "Comparison of gaze-to-objects mapping algorithms", abstract = "Gaze data processing is an important and necessary step in gaze-based applications. This study focuses on the comparison of several gaze-to-object mapping algorithms using various dwell times for selection and presenting targets of several types and sizes. Seven algorithms found in literature were compared against two newly designed algorithms. The study revealed that a fractional mapping algorithm (known) has produced the highest rate of correct selections and fastest selection times, but also the highest rate of incorrect selections. The dynamic competing algorithm (designed) has shown the next best result, but also high rate of incorrect selections. A small impact on the type of target to the calculated statistics has been observed. A strictly centered gazing has helped to increase the rate of correct selections for all algorithms and types of targets. The directions for further mapping algorithms improvement and future investigation have been explained.", keywords = "Algorithm design, Eye gaze pointing and selection, Gaze controlled applications, Gaze to object mapping", author = "Oleg Špakov", year = "2011", doi = "10.1145/1983302.1983308", language = "English", isbn = "9781450306805", booktitle = "Proceedings of the 1st Conference on Novel Gaze-Controlled Applications, NGCA'11", }
@inproceedings{40688bc46441490d951f94f88619e055, title = "Database-driven tool support for DisCo executable specifications", abstract = "In spite of the advances in theory of formal specifications, they have not gained a wide popularity in the software development industry. This could be due to difficulties in understanding them or positioning them into the current work practices, however, we believe that one major problem is that the tool support still does not make the use of the formal specifications easy enough for the software developer. We discuss the required functionality for comprehensive tool support for executable DisCo specifications, and propose a tool architecture based on database technology, and finally, discuss our implementation of the core part of the tool set.", author = "Jyrki Nummenmaa and Timo Nummenmaa", year = "2011", language = "English", isbn = "9789949231782", pages = "44--54", booktitle = "SPLST'11 - Proceedings 12th Symposium on Programming Languages and Software Tools", }
@inproceedings{62320e9a099b423680c229af3dfe1034, title = "Designing tactile feedback for piezo buttons", abstract = "The present aim was to study the preference of tactile feedback stimulations given by non-physical (i.e., solid) piezo-actuated buttons. Participants (n=16) ranked 16 different tactile feedback stimuli varied by 4 output delays and 4 vibration durations. The results showed that the mean ranks of the stimuli differed significantly from each other. The timing parameters of delay and duration interacted with each other, for example, so that preference of certain vibration duration fluctuated in response to different output delays. Using a very short time window (i.e., 10-453 ms) combining both delay and duration parameters of the feedback could result either in favorable or significantly less favorable subjective experience. The results suggest that a preferred perception of tactile feedback from non-physical buttons requires careful design and controlling of the timing parameters.", keywords = "Delay, Haptics, Interaction design, Lag, Non-physical buttons, Piezo-electric, Tactile feedback", author = "Jani Lylykangas and Veikko Surakka and Katri Salminen and Jukka Raisamo and Pauli Laitinen and Kasper R{\"o}nning and Roope Raisamo", year = "2011", doi = "10.1145/1978942.1979428", language = "English", isbn = "9781450302289", pages = "3281--3284", booktitle = "CHI 2011 - 29th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings and Extended Abstracts", }
@inproceedings{8199214ce91f40889cc75bd83a97be17, title = "Facial expression classification based on local spatiotemporal edge and texture descriptors", abstract = "Facial expressions are emotionally, socially and otherwise meaningful reflective signals in the face. Facial expressions play a critical role in human life, providing an important channel of nonverbal communication. Automation of the entire process of expression analysis can potentially facilitate human-computer interaction, making it to resemble mechanisms of human-human communication. In this paper, we present an ongoing research that aims at development of a novel spatiotemporal approach to expression classification in video. The novelty comes from a new facial representation that is based on local spatiotemporal feature descriptors. In particular, a combined dynamic edge and texture information is used for reliable description of both appearance and motion of the expression. Support vector machines are utilized to perform a final expression classification. The planned experiments will further systematically evaluate the performance of the developed method with several databases of complex facial expressions.", keywords = "Action unit, Emotion, Expression classification, Facial expression, Human behaviour understanding, Local binary pattern, Local oriented edge, Spatiotemporal descriptor", author = "Yulia Gizatdinova and Veikko Surakka and Guoying Zhao and Erno M{\"a}kinen and Roope Raisamo", year = "2011", doi = "10.1145/1931344.1931365", language = "English", isbn = "9781605589268", booktitle = "Selected Papers from the Proceedings of the 7th International Conference on Methods and Techniques in Behavioral Research - Digital Edition, MB'10", }
@inproceedings{f9a0271e3fa44156a48d4b29f775e925, title = "Framework for designing and evaluating game achievements", abstract = "This paper presents a framework for evaluating and designing game design patterns commonly called as {"}achievements{"}. The results are based on empirical studies of a variety of popular achievement systems. The results, along with the framework for analyzing and designing achievements, present two definitions of game achievements. From the perspective of the achievement system, an achievement appears as a challenge consisting of a signifying element, rewards and completion logics whose fulfilment conditions are defined through events in other systems (usually games). From the perspective of a single game, an achievement appears as an optional challenge provided by a meta-game that is independent of a single game session and yields possible reward(s).", keywords = "Game achievements, Game design, Game ontology, Game rewards, Gamification, Marketing, Motivation, Online games", author = "Juho Hamari and Veikko Eranti", year = "2011", language = "English", booktitle = "Proceedings of DiGRA 2011 Conference: Think Design Play", }
@article{c5b2c593f8e64ac2afd49dd39717e325, title = "Generative modeling for maximizing precision and recall in information visualization", abstract = "Information visualization has recently been formulated as an information retrieval problem, where the goal is to find similar data points based on the visualized nonlinear projection, and the visualization is optimized to maximize a compromise between (smoothed) precision and recall. We turn the visualization into a generative modeling task where a simple user model parameterized by the data coordinates is optimized, neighborhood relations are the observed data, and straightforward maximum likelihood estimation corresponds to Stochastic Neighbor Embedding (SNE). While SNE maximizes pure recall, adding a mixture component that {"}explains away{"} misses allows our generative model to focus on maximizing precision as well. The resulting model is a generative solution to maximizing tradeoffs between precision and recall. The model outperforms earlier models in terms of precision and recall and in external validation by unsupervised classification.", author = "Jaakko Peltonen and Samuel Kaski", year = "2011", language = "English", volume = "15", pages = "579--587", journal = "Journal of Machine Learning Research", issn = "1532-4435", publisher = "Journal of Machine Learning Research", }
@inproceedings{3fd1a8e61a2b4a0086bc11f97d9d03a8, title = "Narrative friction in Alternate Reality Games: Design insights from conspiracy for good", abstract = "Alternate Reality Games (ARG) tend to have story-driven game structures. Hence, it is useful to investigate how player activities interact with the often pre-scripted storyline in this genre. In this article, we report on a study of a particular ARG production, Conspiracy For Good (CFG), which was at the same time emphasising the role of strong storytelling, and active on-site participation by players. We uncover multiple levels of friction between the story content and the mode of play of live participants, but also between live and online participation. Based on the observations from the production, we present design recommendations for future productions with similar goals.", keywords = "ARG, Design, Gameplay, Games, Larp, Narrative, Pervasive, Transmedia", author = "Jaakko Stenros and Jussi Holopainen and Annika Waern and Markus Montola and Elina Ollila", year = "2011", language = "English", booktitle = "Proceedings of DiGRA 2011 Conference: Think Design Play", }
@inproceedings{693a92c0933641f3951bb0b757f24533, title = "Of discs, boxes and cartridges: The material life of digital games", abstract = "So far the field of game studies has mostly bypassed the everyday meanings attached to the material manifestations of digital games. Based on qualitative survey data, this article examines what kind of personal and collective values are attached to the physical copies of games, including the storage medium and packaging. The results show how materiality resonates with the reliability and unambiguity of ownership. Furthermore, games as physical objects can have a key role in the project of creating a home, receiving their meaning as part of a wider technological and popular cultural meaning structure. Finally, collecting associates games with more general issues of identity, sociability and history. Through storing and organising games and having them on display, gamers position themselves as part of game culture, gather subcultural capital and ensure the possibility for nostalgia.", keywords = "Collecting, Digital distribution, Domestication, Game culture, Material culture, Nostalgia, Physical copies", author = "Saara Toivonen and Olli Sotamaa", year = "2011", language = "English", booktitle = "Proceedings of DiGRA 2011 Conference: Think Design Play", }
@inproceedings{1a8d02ef0f594c5fab6a2fe53c8f91a8, title = "On delay distribution in IEEE 802.11 wireless networks", abstract = "IEEE 802.11 wireless networks have received much attention over the past number of years. Still certain aspects of behavior of wireless networks have not been studied well enough. For example, understanding MAC layer packet delay distribution remains challenging yet. However, obtaining such distribution is highly beneficial for modeling QoS provided by wireless networks. This paper proposes a way of obtaining MAC delay distribution in case of single-hop networks. The proposed way is based on theory of terminating renewal processes and delivers approximation of good precision.", keywords = "delay distribution, IEEE 802.11, MAC layer, modeling", author = "Stepan Ivanov and Dmitri Botvich and Sasitharan Balasubramaniam", year = "2011", doi = "10.1109/ISCC.2011.5983849", language = "English", isbn = "9781457706783", pages = "254--256", booktitle = "16th IEEE Symposium on Computers and Communications, ISCC'11", }
@inproceedings{93924c7a8b9c44f5ae0daaf4bc8da4db, title = "On the costs of multiple trajectory pointing methods", abstract = "Several enhanced pointing techniques aim to reduce the Fitts' law targeting distance by providing multiple target trajectories in the hope that a shorter path is available. However, these techniques introduce a search or decision component to pointing - users must examine the alternatives available and decide upon the trajectory to use. We analyse these difficulties, present a methodology for examining them as well as other behaviour issues, and report empirical results of performance with pointer wrapping and Ninja cursors. Results show that offering multiple trajectories incurs a significant search or decision cost, and that users are therefore poor at capitalising on the theoretical benefits of reduced target distance.", keywords = "Fitts' law, Multiple trajectories, Ninja cursors, Pointing, Search/decision, Wrapping cursors", author = "Philip Quinn and Andy Cockburn and R{\"a}ih{\"a}, {Kari Jouko} and J{\'e}r{\^o}me Delamarche", year = "2011", doi = "10.1145/1978942.1979067", language = "English", isbn = "9781450302289", pages = "859--862", booktitle = "CHI 2011 - 29th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings and Extended Abstracts", }
@inproceedings{d678ce858a244724bb25002c1dcff435, title = "Reducing the number of unit tests with design by contract", abstract = "Design by Contract (DbC) and unit testing (UT) are complementary approaches to improve the belief of correctness and the quality of the software. The interplay between the two techniques has been studied previously, e.g., in the use of test oracles and test automation. However, we propose that DbC should drive the UT to become more cost-effective. The paper demonstrates some means for this approach by showing how to test a mapping data structure entirely with just one unit test script.", keywords = "contract cohesion graph, design by contract, unit testing", author = "Harri Hakonen and Sami Hyrynsalmi and Antero J{\"a}rvi", year = "2011", doi = "10.1145/2023607.2023635", language = "English", isbn = "9781450309172", volume = "578", pages = "161--166", booktitle = "Computer Systems and Technologies - 12th International Conference, CompSysTech'11 - Proceedings", }
@inproceedings{348208a15c0e47b49b136e1d7dc0f1b2, title = "Scheduling of CAL actor networks based on dynamic code analysis", abstract = "CAL is a dataflow oriented language for writing high-level specifications of signal processing applications. The language has recently been standardized and selected for the new MPEG Reconfigurable Video Coding standard.", keywords = "data flow computing, Processor scheduling, video coding", author = "Jani Boutellier and Olli Silven and Mickael Raulet", year = "2011", doi = "10.1109/ICASSP.2011.5946805", language = "English", isbn = "9781457705397", pages = "1609--1612", booktitle = "2011 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2011 - Proceedings", }
@inproceedings{aed426a7b28c41d885880a1fd173e937, title = "Silicon capillary gripper with self-alignment capability", abstract = "This paper reports a novel capillary microgripper. The microgripper is fabricated from silicon using deep reactive ion etching and is designed to be especially suitable for self-alignment. The gripper is shown to retain its self-alignment capabilities even when the head of the gripper does not match the size of the component. This mechanism is analyzed using numerical simulations and tested in pick-and-place experiments using commercial laser diode components. The advantage of the capillary microgripper has been demonstrated in picking and aligning microchips from adhesive films, which requires substantial picking force.", keywords = "Capillary gripper, Micro/nano robots, Microhandling, Self-alignment", author = "Veikko Sariola and Ville Liimatainen and Tatu Tolonen and Reidar Udd and Quan Zhou", year = "2011", doi = "10.1109/ICRA.2011.5979980", language = "English", isbn = "9781612843865", pages = "4098--4103", booktitle = "2011 IEEE International Conference on Robotics and Automation, ICRA 2011", }
@inproceedings{ad02c12e42704a028c80f47cfbe0b690, title = "Social and privacy aspects of a system for collaborative public expression", abstract = "In this paper, we are concerned with how a real-world social situation shapes the interaction with a novel technology that combines collocated mobile phone and public display use for groups of people. We present a user study of a system that allows collaborative creation and sharing of comic strips on public displays in a social setting such as a pub or caf{\'e}. The system utilizes mobile phones and public displays for shared collaborative expression between collocated users. A user study spanning three sessions was conducted in real-world settings: one during the social event following a seminar on games research and two in a bar on a regular weekday evening. We present and discuss our findings with respect to how the larger social situation and location influenced the interaction with the system, the collaboration between participants of a team, how people moved between different roles (i.e., actor, spectator and bystander), and the privacy issues it evoked from participants.", keywords = "Collaborative interaction, Evaluation, Mobile phones, Public interfaces, Social context", author = "Jussi Holopainen and Andr{\'e}s Lucero and Hannamari Saarenp{\"a}{\"a} and Timo Nummenmaa and Ali, {Abdallah El} and Tero Jokela", year = "2011", doi = "10.1145/2071423.2071452", language = "English", isbn = "9781450308274", booktitle = "Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology, ACE 2011", }
@inproceedings{3f9616d7a61c4a118ef0d5080cb5a36d, title = "Squeeze vs. tilt: A comparative study using continuous tactile feedback", abstract = "This paper presents an investigation into the performance of squeezing as a manipulative interaction technique in comparison to tilting with an aim to answer two questions: is squeezing an effective input technique for mobile devices and can tactile feedback improve performance? The experiment results show that both input methods are viable but squeezing is significantly faster and more sustainable than tilting (with and without tactile feedback).", keywords = "Haptic I/O, Mobile interaction, Pressure, Squeeze", author = "Eve Hoggan and Dari Trendafilov and Teemu Ahmaniemi and Roope Raisamo", year = "2011", doi = "10.1145/1979742.1979766", language = "English", isbn = "9781450302289", pages = "1309--1314", booktitle = "CHI EA 2011 - 29th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings and Extended Abstracts", }
@inproceedings{4996639af9814b53b5f59b480459325f, title = "System level performance simulation of distributed GENESYS applications on multi-core platforms", abstract = "Modern high end mobile devices employ multi-core platforms and support diverse distributed applications due to increased computational power. A brisk performance evaluation phase is required after the application modelling to evaluate feasibility of new distributed applications on the multi-core mobile platforms. GENESYS modelling methodology which employs service-oriented and component based distributed application design has been extended for this purpose such that application level services are refined to platform-level services allowing mapping of GENESYS application architecture to workload models used in performance evaluation. This results in easy extraction of application workload models, reducing the time and effort in the performance evaluation phase needed for architectural exploration. This article presents the way brisk performance evaluation of distributed GENESYS applications is achieved by employing extended GENESYS distributed application architecture. The approach is experimented with a case study. UML2.0 MARTE profile, Papyrus UML2.0 modelling tool and SystemC were used for modelling and simulation.", keywords = "ABSOLUT, GENESYS, MARTE profile, UML2.0", author = "Khan, {Subayal Aftab} and Jukka Saastamoinen and Kari Tiensyrj{\"a} and Jari Nurmi", year = "2011", doi = "10.1109/DASC.2011.70", language = "English", isbn = "9780769546124", pages = "313--320", booktitle = "Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011", }
@inproceedings{60717d5d0b2a4c54ad1610ad97daabac, title = "The making of Nordic larp: Documenting a tradition of ephemeral co-creative play", abstract = "Research and documentation of live action role-playing games, or larps, must tackle problems of ephemerality, subjectivity, first person audience and co-creation, as well as the underlying question of what larps are. In this paper these challenges are outlined and solutions to handling them are proposed. This is done through the prism of producing a picture-heavy art book on Nordic larp. The paper also discussed the problems of writing about game cultures as an insider and makes a case for addressing normative choices in game descriptions head on.", keywords = "Documentation, Game culture, Games, Larp, Nordic, Play, Role-playing games", author = "Jaakko Stenros and Markus Montola", year = "2011", language = "English", booktitle = "Proceedings of DiGRA 2011 Conference: Think Design Play", }
@article{82d2fe2cc2964aeb976eff66c9de1f86, title = "Conversion algorithms and implementations for koblitz curve cryptography", abstract = "In this paper, we discuss conversions between integers and \tau-adic expansions and we provide efficient algorithms and hardware architectures for these conversions. The results have significance in elliptic curve cryptography using Koblitz curves, a family of elliptic curves offering faster computation than general elliptic curves. However, in order to enable these faster computations, scalars need to be reduced and represented using a special base-τ expansion. Hence, efficient conversion algorithms and implementations are necessary. Existing conversion algorithms require several complicated operations, such as multiprecision multiplications and computations with large rationals, resulting in slow and large implementations in hardware and microcontrollers with limited instruction sets. Our algorithms are designed to utilize only simple operations, such as additions and shifts, which are easily implementable on practically all platforms. We demonstrate the practicability of the new algorithms by implementing them on Altera Stratix ∥ FPGAs. The implementations considerably improve both computation speed and required area compared to the existing solutions.", keywords = "Elliptic curve cryptography, Field-programmable gate arrays, Koblitz curves, Public-key cryptosystems", author = "Brumley, {Billy Bob} and Jarvinen, {Kimmo U.}", year = "2010", month = "1", day = "4", doi = "10.1109/TC.2009.132", language = "English", volume = "59", pages = "81--92", journal = "IEEE Transactions on Computers", issn = "0018-9340", publisher = "Institute of Electrical and Electronics Engineers", number = "1", }
@inproceedings{fab454e72dd744428d0d5d61a1e78091, title = "Integrated controller for an over-constrained cable driven parallel manipulator: KNTU CDRPM", abstract = "This paper presents an approach to the control of the KNTU CDRPM using an integrated control scheme. The goal in this approach is achieving accurate trajectory tracking while assuring positive tension in the cables. By the proposed controller, the inherent nonlinear behavior of the cable and the target tracking errors are simultaneously compensated. In this paper asymptotic stability analysis of the close loop system is studied in detail. Moreover, it is shown that the integrated control strategy reduces the tracking error by 80{\%} compared to that of a single loop controller in the considered manipulator. The closed-loop performance of the control topology is analyzed by a simulation study that is performed on the manipulator. The simulation study verifies that the proposed controller is not only promising to be implemented on the KNTU CDRPM, but also being suitable for other cable driven manipulators.", author = "Alaleh Vafaei and Aref, {Mohammad M.} and Taghirad, {Hamid D.}", year = "2010", doi = "10.1109/ROBOT.2010.5509991", language = "English", isbn = "9781424450381", pages = "650--655", booktitle = "Proceedings - IEEE International Conference on Robotics and Automation", }
@inproceedings{41369ca58ba44f4fb310b0708a3982c7, title = "Predicting OSS trustworthiness on the basis of elementary code assessment", abstract = "Background. Open Source Software (OSS) provides increasingly serious and viable alternatives to traditional closed source software. The number of OSS users is continuously growing, as is the number of potential users that are interested in evaluating the quality of OSS. The latter would greatly benefit from simple methods for evaluating the trustworthiness of OSS. Objective. This paper aims at finding a quantitative relationship between the perceived quality of OSS and a few simple objective measures. Method. the users' and developers' evaluations of trustworthiness and reliability of OSS products were collected and correlated to static code measures, called {"}Elementary Code Assessment{"} rules, which check very simple rules that well-written code should satisfy. Results. The result of the analysis is a set of quantitative models that link static measures of the source code to perceivable qualities of OSS. These models can be used by: 1) end-users and developers that would like to reuse existing OSS products and components, to evaluate the level of trustworthiness and reliability that can be expected based on the characteristics of code; 2) developers of OSS products, who can set code quality targets based on the level of trustworthiness and reliability they want to achieve. Conclusions. The perceivable quality of OSS seems to be predictable on the basis of simple static code measures. However, only a part of the many measures produced by tools appears actually correlated to the quality of software that are perceivable by users.", keywords = "elementary code assessment (ECA) rules, source code analysis, static analysis, trustworthiness of open-source software", author = "Luigi Lavazza and Sandro Morasca and Davide Taibi and Davide Tosi", year = "2010", doi = "10.1145/1852786.1852834", language = "English", isbn = "9781450300391", booktitle = "ESEM 2010 - Proceedings of the 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement", }
@inproceedings{f6e542a49ffc4bd089a14970d0abfdb7, title = "The QualiSPo approach to OSS product quality evaluation", abstract = "The quality of Open Source Software (OSS) is generally much debated. Some state that it is generally higher than closed-source counterparts, while others are more skeptical. In the QualiSPo project the authors addressed the problem of evaluating OSS products in a manner that is both as complete as possible and objective. To this end, a toolset and an evaluation framework are needed. The paper describes such toolset and framework, and accounts for the first evaluations that are being obtained.", keywords = "open source software, software quality evaluation, software trustworthiness", author = "{Del Bianco}, Vieri and Luigi Lavazza and Sandro Morasca and Davide Taibi and Davide Tosi", year = "2010", doi = "10.1145/1833272.1833277", language = "English", isbn = "9781605589787", pages = "23--28", booktitle = "3rd Int. Workshop on Emerging Trends in Free/Libre/Open Source Software Research and Development, FLOSS-3, in Conj. with the 32nd ACM/IEEE International Conference on Software Engineering, ICSE 2010", }
@inproceedings{f303d4373c884874b91268fac9b6c19e, title = "Mobile Journalist Toolkit: A field study on producing news articles with a mobile device", abstract = "Today's handheld mobile devices with advanced multimedia capabilities and wireless broadband connectivity have emerged as potential new tools for journalists to produce news articles. It is envisioned that they could enable faster, more authentic, and more efficient news production, and many large news producing organizations, including Reuters and BBC, have recently been experimenting with them. In this paper, we present a field study on using mobile devices to produce news articles. During the study, a group of 19 M.A.-level journalism students used the Mobile Journalist Toolkit, a lightweight set of tools for mobile journalist work built around the Nokia N82 camera phone, to produce an online news blog. Our results indicate that while the mobile device cannot completely replace the traditional tools, for some types of journalist tasks they provide major benefits over the traditional tools, and are thus a useful addition to the journalist's toolbox.", keywords = "Camera phones, Field study, Journalism, Mobile devices, Multimedia publishing", author = "Tero Jokela and Heli V{\"a}{\"a}t{\"a}j{\"a} and Tiina Koponen", year = "2009", doi = "10.1145/1621841.1621851", language = "English", isbn = "9781605586335", pages = "45--52", booktitle = "MindTrek 2009 - 13th International Academic MindTrek Conference: Everyday Life in the Ubiquitous Era", }
@inproceedings{95961384d6d746b09b5f816f62b7db6a, title = "Pure e-learning course in information security", abstract = "We describe key elements and contents of an e-learning course on practical information security that deals with awareness and skills required in daily life. We have had good results in reaching the learning goals and in low resource consuming nature from a teacher's point of view. From a student's point of view the course has been laborious but very instructive and meaningful. We outline also the opportunities of using such a course to contribute to work for information security awareness and usability studies.", keywords = "Design, Documentation, Economics, Experimentation, Human dactors, K.3.2 [Computer and information science education]: Information systems education, Legal aspects, Measurement, Performance, Reliability, Security", author = "Koskinen, {Jukka A.} and Kelo, {Tomi O.}", year = "2009", doi = "10.1145/1626195.1626200", language = "English", pages = "8--13", editor = "A. Elci", booktitle = "Proceedings of SIN'09, Second International Conference on Security of Information and Networks, Famagusta, North Cypros, October 6-10, 2009", }
@inproceedings{c8b45b5fc8d340dcbabce38c76fa88be, title = "Towards certifying the testing process of open-source software: New challenges or old methodologies?", abstract = "To improve both the quality and the trustworthiness perception of Open Source Software (OSS) products, we introduce the new idea of certifying the testing process of an OSS system. While the global certification of an OSS product is an emerging research field, the idea of certifying only its testing process has never been studied, conversely to the case of Closed Source Software (CSS) products. The certification of the testing process has a twofold goal: simplify the process of testing OSS products by guiding developers in identifying the proper testing strategies and the limitations of their existing testing plans; simplify the selection of equivalent OSS and CSS products by evaluating the certificates released by the companies. Specifically, in this paper we discuss 1) a set of issues, inherent to OSS, that must be taken into account when testing the OSS product; 2) a preliminary methodology that suggests how to certificate the testing process of OSS products; 3) the BusyBox case study that shows how our idea can be applied to real-life OSS.", author = "Sandro Morasca and Davide Taibi and Davide Tosi", year = "2009", doi = "10.1109/FLOSS.2009.5071356", language = "English", isbn = "9781424437207", pages = "25--30", booktitle = "Proceedings of the 2009 ICSE Workshop on Emerging Trends in Free/Libre/Open Source Software Research and Development, FLOSS 2009", }
@inproceedings{64432c55c95a4dffbe7dfba946e90e04, title = "Wrench feasible workspace analysis of cable-driven parallel manipulators using LMI approach", abstract = "Workspace analysis is one of the most important issues in robotic manipulator design. This paper introduces a systematic method of analysis the wrench feasible workspace for general redundant cable-driven parallel manipulators. In this method, wrench feasible workspace is formulated in term of linear matrix inequalities and projective method is used for solving them. This method is one of the most efficient interiorpoint methods with a polynomial-time complexity. Moreover, the notion of dexterous workspace is defined, which can be determined for redundant cable driven manipulators exerting a worst case external wrench at the end effector. A detailed case study of the wrench feasible workspace and dexterous workspace determination are included for a six DOF, eight actuated cable-driven redundant parallel manipulator.", author = "Loloei, {Azadeh Zarif} and {Mohammadi Aref}, Mohammad and Taghirad, {Hamid D.}", year = "2009", doi = "10.1109/AIM.2009.5229723", language = "English", isbn = "9781424428533", pages = "1034--1039", booktitle = "IEEE/ASME International Conference on Advanced Intelligent Mechatronics, AIM", }
@inproceedings{86b9b1c6714541aca66892c81c1cb2dc, title = "Classification of large graphs by a local tree decomposition", abstract = "We present a binary graph classifier (BGC) which allows to classify large, unweighted, undirected graphs. This classifier is based on a local decomposition of the graph for each node in generalized trees. The obtained trees, forming the tree set of the graph, are then pairwise compared by a generalized tree-similarity-algorithm (GTSA) and the resulting similarity scores determine a characteristic similarity distribution of the graph. Classification in this context is defined as mutual consistency for all pure and mixed tree sets and their resulting similarity distributions in a graph class. We demonstrate the application of this method to an artificially generated data set and for data from microarray experiments of cervical cancer.", author = "Frank Emmert-Streib and Matthias Dehmert and J{\"u}rgen Kilian", year = "2005", language = "English", isbn = "9781932415797", pages = "200--207", booktitle = "Proceedings of the 2005 International Conference on Data Mining, DMIN'05", }
@inproceedings{461045e1601445b488007d8de6875488, title = "HCI and homecare: Connecting families and clinicians", abstract = "The proposed workshop aims to form a community of individuals interested in using computing technology to promote healthcare and support wellness in the context of homecare. We strive to connect and engage researchers from several distinct fields of scientific inquiry and practice: people with clinical experience, developers of enabling technologies and HCI researchers interested in home healthcare and issues such as aging in place. The focus of this one-day workshop is on establishing common ground in vocabulary, research methods and research framework; understanding the shared needs of people with health challenges, their families and clinicians, and developing a joint framework for future research.", keywords = "Aging, Health care, Home, Medicine, Pervasive computing", author = "Lena Mamykina and Bardram, {Jakob E.} and Ilkka Korhonen and Elizabeth Mynatt and Wanda Pratt", year = "2004", doi = "10.1145/985921.986197", language = "English", isbn = "1581137036", pages = "1715--1716", booktitle = "Conference on Human Factors in Computing Systems - Proceedings", }
@article{acf0ebdf82f64ff0944d1a92c23027d6, title = "A simulation case study of production planning and control in printed wiring board manufacturing", abstract = "Production planning and control in printed wiring board (PWB) manufacturing is becoming more difficult as PWB's technology is developing and the production routings become more complex. Simultaneously, the strategic importance of delivery accuracy, short delivery times, and production flexibility is increasing with the highly fluctuating demand and short product life cycles of end products. New principles, that minimize throughput time while guaranteering excellent customer service and adequate capacity utilization, are needed for production planning and control. Simulation is needed in order to develop the new principles and test their superiority. This paper presents an ongoing simulation product that aims at developing the production planning and control of a PWB manufacturer. In the project, a discrete event simulation model is built of a pilot case factory. The model is used for comparing the effect of scheduling, queuing rules, buffer policies, and lot sizes on customer service and cost efficiency.", author = "Korhonen, {H. M E} and Jussi Heikkil{\"a} and T{\"o}rnwall, {Jon M.}", year = "2001", month = "12", day = "1", language = "English", volume = "2", pages = "844--847", journal = "Winter Simulation Conference Proceedings", issn = "0275-0708", }